Sciweavers

384 search results - page 58 / 77
» A Vector Approach to Cryptography Implementation
Sort
View
RECOMB
2006
Springer
16 years 2 months ago
A Sublinear-Time Randomized Approximation Scheme for the Robinson-Foulds Metric
The Robinson-Foulds (RF) metric is the measure most widely used in comparing phylogenetic trees; it can be computed in linear time using Day's algorithm. When faced with the n...
Nicholas D. Pattengale, Bernard M. E. Moret
ICCAD
2002
IEEE
108views Hardware» more  ICCAD 2002»
15 years 10 months ago
A precorrected-FFT method for simulating on-chip inductance
The simulation of on-chip inductance using PEEC-based circuit analysis methods often requires the solution of a subproblem where an extracted inductance matrix must be multiplied ...
Haitian Hu, David Blaauw, Vladimir Zolotov, Kaushi...
150
Voted
BIBM
2009
IEEE
151views Bioinformatics» more  BIBM 2009»
15 years 8 months ago
Detection of Gene Orthology Based on Protein-Protein Interaction Networks
Abstract—Ortholog detection methods present a powerful approach for finding genes that participate in similar biological processes across different organisms, extending our unde...
Fadi Towfic, M. Heather West Greenlee, Vasant Hona...
HYBRID
2005
Springer
15 years 7 months ago
Optimal Control of Discrete Hybrid Stochastic Automata
This paper focuses on hybrid systems whose discrete state transitions depend on both deterministic and stochastic events. For such systems, after introducing a suitable hybrid mod...
Alberto Bemporad, Stefano Di Cairano
ARC
2010
Springer
186views Hardware» more  ARC 2010»
15 years 5 months ago
Application-Specific Signatures for Transactional Memory in Soft Processors
As reconfigurable computing hardware and in particular FPGA-based systems-on-chip comprise an increasing number of processor and accelerator cores, supporting sharing and synchroni...
Martin Labrecque, Mark Jeffrey, J. Gregory Steffan