Sciweavers

563 search results - page 81 / 113
» Verifiable Signature Sharing
Sort
View
BMCBI
2002
81views more  BMCBI 2002»
13 years 8 months ago
Species-specific protein sequence and fold optimizations
Background: An organism's ability to adapt to its particular environmental niche is of fundamental importance to its survival and proliferation. In the largest study of its k...
Michel Dumontier, Katerina Michalickova, Christoph...
IPPS
2003
IEEE
14 years 2 months ago
Effective Utilization and Reconfiguration of Distributed Hardware Resources Using Job Management Systems
Reconfigurable hardware resources are very expensive, and yet can be underutilized. This paper describes a middleware capable of discovering underutilized computing nodes with FPG...
Kris Gaj, Tarek A. El-Ghazawi, Nikitas A. Alexandr...
CCS
2010
ACM
14 years 6 days ago
RunTest: assuring integrity of dataflow processing in cloud computing infrastructures
Cloud computing has emerged as a multi-tenant resource sharing platform, which allows different service providers to deliver software as services in an economical way. However, fo...
Juan Du, Wei Wei, Xiaohui Gu, Ting Yu
PROLAMAT
1998
13 years 10 months ago
Design Knowledge Collection by Modeling
Since design is a process in which designers use various kinds of knowledge and it is an open-ended problem, it is difficult to prepare all necessary knowledge before design. Also...
Masaharu Yoshioka, T. Sekiya, Tetsuo Tomiyama
ATVA
2009
Springer
97views Hardware» more  ATVA 2009»
13 years 10 months ago
Memory Usage Verification Using Hip/Sleek
Embedded systems often come with constrained memory footprints. It is therefore essential to ensure that software running on such platforms fulfils memory usage specifications at c...
Guanhua He, Shengchao Qin, Chenguang Luo, Wei-Ngan...