Sciweavers

8655 search results - page 304 / 1731
» Challenges for Trusted Computing
Sort
View
BIBM
2007
IEEE
110views Bioinformatics» more  BIBM 2007»
15 years 7 months ago
Risk Factor Searching Heuristics for SNP Case-Control Studies
This paper addresses the computational challenge facing association analysis of case-control studies
Dumitru Brinza, Alexander Zelikovsky
124
Voted
DIGRA
2005
Springer
15 years 9 months ago
The Ethics of Computer Game Design
Every choice implies responsibility. Responsibility implies ethical values imprinted in those choices. Computer games have been considered “a series of interesting choices”1 ....
Miguel Sicart
GCC
2007
Springer
15 years 9 months ago
Quality of Service of Grid Computing: Resource Sharing
Rapid advancement of communication technology has changed the landscape of computing. New models of computing, such as business-on-demand, Web services, peer-to-peer networks, and...
Xian-He Sun, Ming Wu
147
Voted
PERCOM
2010
ACM
15 years 1 months ago
A visual, open-ended approach to prototyping ubiquitous computing applications
By nature, ubiquitous computing applications are intimately intertwined with users' everyday life. This situation is challenging because it requires to make the development of...
Zoé Drey, Charles Consel
VLSI
2007
Springer
15 years 9 months ago
Simulation of hybrid computer architectures: simulators, methodologies and recommendations
— In the future, high performance computing systems may consist of multiple multicore processors and reconfigurable logic coprocessors. Industry trends indicate that such coproc...
Pranav Vaidya, Jaehwan John Lee