Sciweavers

10608 search results - page 1736 / 2122
» Complexity of O'Hara's Algorithm
Sort
View
109
Voted
ISCAS
2008
IEEE
110views Hardware» more  ISCAS 2008»
15 years 7 months ago
Non-traditional irregular interconnects for massive scale SoC
— By using self-assembling fabrication techniques at the cellular, molecular, or atomic scale, it is nowadays possible to create functional assemblies in a mainly bottom-up way t...
Christof Teuscher, Anders A. Hansson
IWNAS
2008
IEEE
15 years 7 months ago
A Novel Embedded Accelerator for Online Detection of Shrew DDoS Attacks
∗ As one type of stealthy and hard-to-detect attack, lowrate TCP-targeted DDoS attack can seriously throttle the throughput of normal TCP flows for a long time without being noti...
Hao Chen, Yu Chen
SIBGRAPI
2008
IEEE
15 years 7 months ago
Structural Matching of 2D Electrophoresis Gels using Graph Models
2D electrophoresis is a well known method for protein separation which is extremely useful in the field of proteomics. Each spot in the image represents a protein accumulation an...
Alexandre Noma, Alvaro Pardo, Roberto Marcondes Ce...
121
Voted
TASE
2008
IEEE
15 years 7 months ago
Reasoning about Channel Passing in Choreography
Abstract Web services choreography describes global models of service interactions among a set of participants. For an interaction to be executed, the participants taken part in it...
Hongli Yang, Chao Cai, Liyang Peng, Xiangpeng Zhao...
ADBIS
2008
Springer
131views Database» more  ADBIS 2008»
15 years 7 months ago
Increasing Expressiveness of Composite Events Using Parameter Contexts
The event-condition-action paradigm (also known as triggers or ECA rules) gives a database “active” capabilities – the ability to react automatically to changes in the databa...
Indrakshi Ray, Wei Huang
« Prev « First page 1736 / 2122 Last » Next »