Sciweavers

14 search results - page 2 / 3
» A Usage Profile and Evaluation of a Wide-Area Distributed Fi...
Sort
View
HPCA
2006
IEEE
14 years 5 months ago
InfoShield: a security architecture for protecting information usage in memory
Cyber theft is a serious threat to Internet security. It is one of the major security concerns by both network service providers and Internet users. Though sensitive information c...
Guofei Gu, Hsien-Hsin S. Lee, Joshua B. Fryman, Ju...
BMCBI
2010
166views more  BMCBI 2010»
13 years 5 months ago
Accurate peak list extraction from proteomic mass spectra for identification and profiling studies
Background: Mass spectrometry is an essential technique in proteomics both to identify the proteins of a biological sample and to compare proteomic profiles of different samples. ...
Nicola Barbarini, Paolo Magni
SIGUCCS
2004
ACM
13 years 10 months ago
A platform independent tool for evaluating performance of computing equipment for a computer laboratory
Designing computing equipment for a computer laboratory is not easy. In a class in a computer laboratory, it is not unusual that all students do the same thing simultaneously. Tre...
Takashi Yamanoue
ICCAD
2006
IEEE
149views Hardware» more  ICCAD 2006»
14 years 1 months ago
Thermal sensor allocation and placement for reconfigurable systems
Temperature monitoring using thermal sensors is an essential tool for evaluating the thermal behavior and sustaining the reliable operation in high-performance and high-power syst...
Rajarshi Mukherjee, Somsubhra Mondal, Seda Ogrenci...
AICCSA
2008
IEEE
291views Hardware» more  AICCSA 2008»
13 years 6 months ago
A dynamic weighted data replication strategy in data grids
Data grids deal with a huge amount of data regularly. It is a fundamental challenge to ensure efficient accesses to such widely distributed data sets. Creating replicas to a suita...
Ruay-Shiung Chang, Hui-Ping Chang, Yun-Ting Wang