Sciweavers

43264 search results - page 8280 / 8653
» Comparing models of computation
Sort
View
COMCOM
2008
138views more  COMCOM 2008»
15 years 3 months ago
Secure content access and replication in pure P2P networks
Despite the advantages offered by pure Peer-to-Peer (P2P) networks (e.g. robustness and fault tolerance), a crucial requirement is to guarantee basic security properties, such as ...
Esther Palomar, Juan M. Estévez-Tapiador, J...
134
Voted
CORR
2010
Springer
255views Education» more  CORR 2010»
15 years 3 months ago
Scalable Tensor Factorizations for Incomplete Data
The problem of incomplete data--i.e., data with missing or unknown values--in multi-way arrays is ubiquitous in biomedical signal processing, network traffic analysis, bibliometri...
Evrim Acar, Tamara G. Kolda, Daniel M. Dunlavy, Mo...
110
Voted
CONCURRENCY
2008
95views more  CONCURRENCY 2008»
15 years 3 months ago
The File Mover: high-performance data transfer for the grid
The exploration in many scientific disciplines (e.g., High-Energy Physics, Climate Modeling, and Life Sciences) involves the production and the analysis of massive data collection...
Cosimo Anglano, Massimo Canonico
CONSTRAINTS
2008
78views more  CONSTRAINTS 2008»
15 years 3 months ago
Boosting Haplotype Inference with Local Search
Abstract. A very challenging problem in the genetics domain is to infer haplotypes from genotypes. This process is expected to identify genes affecting health, disease and response...
Inês Lynce, João Marques-Silva, Steve...
124
Voted
CORR
2010
Springer
138views Education» more  CORR 2010»
15 years 3 months ago
A Framework for Interactive Work Design based on Digital Work Analysis and Simulation
Due to the flexibility and adaptability of human, manual handling work is still very important in industry, especially for assembly and maintenance work. Well-designed work operat...
Liang Ma, Wei Zhang, Huanzhang Fu, Yang Guo, Damie...
« Prev « First page 8280 / 8653 Last » Next »