Sciweavers

289 search results - page 57 / 58
» Using Slicing to Identify Duplication in Source Code
Sort
View
PIMRC
2008
IEEE
14 years 11 days ago
Network-Assisted Wireless Computing
Abstract—Multimedia applications for mobile devices are increasing and growing more sophisticated. Many of these applications require computationally intensive processing, such a...
Carri W. Chan, Nicholas Bambos, Jatinder Pal Singh
WECWIS
2007
IEEE
172views ECommerce» more  WECWIS 2007»
14 years 7 days ago
An Analysis Tool for Execution of BPEL Services
Business Process Execution Language (BPEL) is an XML-based language for specifying services. There have been numerous recent research and development efforts in both statically an...
Ariane Gravel, Xiang Fu, Jianwen Su
IMC
2006
ACM
13 years 12 months ago
Rarest first and choke algorithms are enough
The performance of peer-to-peer file replication comes from its piece and peer selection strategies. Two such strategies have been introduced by the BitTorrent protocol: the rare...
Arnaud Legout, Guillaume Urvoy-Keller, Pietro Mich...
BMCBI
2010
156views more  BMCBI 2010»
13 years 6 months ago
PeakAnalyzer: Genome-wide annotation of chromatin binding and modification loci
Background: Functional genomic studies involving high-throughput sequencing and tiling array applications, such as ChIP-seq and ChIP-chip, generate large numbers of experimentally...
Mali Salmon-Divon, Heidi Dvinge, Kairi Tammoja, Pa...
BMCBI
2008
149views more  BMCBI 2008»
13 years 6 months ago
Clustering of cognate proteins among distinct proteomes derived from multiple links to a single seed sequence
Background: Modern proteomes evolved by modification of pre-existing ones. It is extremely important to comparative biology that related proteins be identified as members of the s...
Adriano Barbosa-Silva, Venkata P. Satagopam, Reinh...