Sciweavers

784 search results - page 121 / 157
» An underlying model for defeat mechanisms
Sort
View
CC
2008
Springer
15 years 3 months ago
Generating SIMD Vectorized Permutations
Abstract. This paper introduces a method to generate efficient vectorized implementations of small stride permutations using only vector load and vector shuffle instructions. These...
Franz Franchetti, Markus Püschel
CIBCB
2005
IEEE
15 years 3 months ago
A Transcriptional Approach to Gene Clustering
— We present an integrative method for clustering coregulated genes and elucidating their underlying regulatory mechanisms. We use multi-state partition functions and thermodynam...
Ilias Tagkopoulos
COLING
2008
15 years 3 months ago
Choosing the Right Translation: A Syntactically Informed Classification Approach
One style of Multi-Engine Machine Translation architecture involves choosing the best of a set of outputs from different systems. Choosing the best translation from an arbitrary s...
Simon Zwarts, Mark Dras
DAIS
2006
15 years 3 months ago
Mobile Process Description and Execution
Abstract. Mobile devices are increasingly aware of their respective locations and vicinity and tend to communicate rather loosely with each other; therefore asynchronous communicat...
Christian P. Kunze, Sonja Zaplata, Winfried Lamers...
113
Voted
DBSEC
2006
115views Database» more  DBSEC 2006»
15 years 3 months ago
Creating Objects in the Flexible Authorization Framework
Access control is a crucial concern to build secure IT systems and, more specifically, to protect the confidentiality of information. However, access control is necessary, but not ...
Nicola Zannone, Sushil Jajodia, Duminda Wijesekera