Sciweavers

9316 search results - page 1728 / 1864
» Analysis of traceback techniques
Sort
View
INTERNET
2002
142views more  INTERNET 2002»
15 years 3 months ago
Mapping the Gnutella Network
Despite recent excitement generated by the peer-to-peer (P2P) paradigm and the surprisingly rapid deployment of some P2P applications, there are few quantitative evaluations of P2...
Matei Ripeanu, Adriana Iamnitchi, Ian T. Foster
JCB
1998
92views more  JCB 1998»
15 years 3 months ago
Homology Detection via Family Pairwise Search
The function of an unknown biological sequence can often be accurately inferred by identifying sequences homologous to the original sequence. Given a query set of known homologs, ...
William Noble Grundy
SIAMCOMP
1998
113views more  SIAMCOMP 1998»
15 years 3 months ago
Two-Dimensional Periodicity in Rectangular Arrays
Abstract. String matching is rich with a variety of algorithmic tools. In contrast, multidimensional matching has had a rather sparse set of techniques. This paper presents a new a...
Amihood Amir, Gary Benson
TOSEM
1998
80views more  TOSEM 1998»
15 years 3 months ago
Discovering Models of Software Processes from Event-Based Data
Many software process methods and tools presuppose the existence of a formal model of a process. Unfortunately, developing a formal model for an on-going, complex process can be d...
Jonathan E. Cook, Alexander L. Wolf
TVLSI
1998
122views more  TVLSI 1998»
15 years 3 months ago
Algorithm-based low-power transform coding architectures: the multirate approach
—In most low-power VLSI designs, the supply voltage is usually reduced to lower the total power consumption. However, the device speed will be degraded as the supply voltage goes...
An-Yeu Wu, K. J. Ray Liu
« Prev « First page 1728 / 1864 Last » Next »