Sciweavers

1040 search results - page 163 / 208
» A Comparative Performance Evaluation of Write Barrier Implem...
Sort
View
CHES
2010
Springer
189views Cryptology» more  CHES 2010»
15 years 27 days ago
Quark: A Lightweight Hash
The need for lightweight (that is, compact, low-power, low-energy) cryptographic hash functions has been repeatedly expressed by application designers, notably for implementing RFI...
Jean-Philippe Aumasson, Luca Henzen, Willi Meier, ...
BMCBI
2010
166views more  BMCBI 2010»
14 years 12 months ago
Accurate peak list extraction from proteomic mass spectra for identification and profiling studies
Background: Mass spectrometry is an essential technique in proteomics both to identify the proteins of a biological sample and to compare proteomic profiles of different samples. ...
Nicola Barbarini, Paolo Magni
AR
2006
89views more  AR 2006»
14 years 12 months ago
Design and validation of a complete haptic system for manipulative tasks
The present work deals with the design, implementation and assessment of a new haptic system specifically conceived for manipulative tasks in virtual environments. Such a system wa...
Massimo Bergamasco, Carlo Alberto Avizzano, Antoni...
FGCS
2008
140views more  FGCS 2008»
14 years 12 months ago
Blocking vs. non-blocking coordinated checkpointing for large-scale fault tolerant MPI Protocols
A long-term trend in high-performance computing is the increasing number of nodes in parallel computing platforms, which entails a higher failure probability. Fault tolerant progr...
Darius Buntinas, Camille Coti, Thomas Hérau...
CN
2007
95views more  CN 2007»
14 years 11 months ago
Sampling large Internet topologies for simulation purposes
In this paper, we develop methods to ‘‘sample’’ a small realistic graph from a large Internet topology. Despite recent activity, modeling and generation of realistic graph...
Vaishnavi Krishnamurthy, Michalis Faloutsos, Marek...