Sciweavers

191 search results - page 38 / 39
» Providing Effective Access to Shared Resources: A COIN Appro...
Sort
View
CCS
2009
ACM
14 years 26 days ago
Privacy-preserving genomic computation through program specialization
In this paper, we present a new approach to performing important classes of genomic computations (e.g., search for homologous genes) that makes a significant step towards privacy...
Rui Wang, XiaoFeng Wang, Zhou Li, Haixu Tang, Mich...
ESORICS
2010
Springer
13 years 6 months ago
D(e|i)aling with VoIP: Robust Prevention of DIAL Attacks
We carry out attacks using Internet services that aim to keep telephone devices busy, hindering legitimate callers from gaining access. We use the term DIAL (Digitally Initiated A...
Alexandros Kapravelos, Iasonas Polakis, Elias Atha...
OSDI
1996
ACM
13 years 7 months ago
Automatic Compiler-Inserted I/O Prefetching for Out-of-Core Applications
Current operating systems offer poor performance when a numeric application's working set does not fit in main memory. As a result, programmers who wish to solve "out-of...
Todd C. Mowry, Angela K. Demke, Orran Krieger
HPCS
2005
IEEE
13 years 11 months ago
A Lightweight, Scalable Grid Computing Framework for Parallel Bioinformatics Applications
Abstract— In recent years our society has witnessed an unprecedented growth in computing power available to tackle important problems in science, engineering and medicine. For ex...
Hans De Sterck, Rob S. Markel, Rob Knight
BMCBI
2006
146views more  BMCBI 2006»
13 years 6 months ago
GeneTools - application for functional annotation and statistical hypothesis testing
Background: Modern biology has shifted from "one gene" approaches to methods for genomic-scale analysis like microarray technology, which allow simultaneous measurement ...
Vidar Beisvag, Frode K. R. Jünge, Hallgeir Be...