Sciweavers

6960 search results - page 1131 / 1392
» Continuity Analysis of Programs
Sort
View
118
Voted
BMCBI
2006
86views more  BMCBI 2006»
15 years 4 months ago
PHY*FI: fast and easy online creation and manipulation of phylogeny color figures
nd: The need to depict a phylogeny, or some other kind of abstract tree, is very frequently experienced by researchers from a broad range of biological and computational disciplin...
Jakob Fredslund
CAL
2006
15 years 4 months ago
Performance, power efficiency and scalability of asymmetric cluster chip multiprocessors
This paper evaluates asymmetric cluster chip multiprocessor (ACCMP) architectures as a mechanism to achieve the highest performance for a given power budget. ACCMPs execute serial ...
T. Y. Morad, Uri C. Weiser, A. Kolodnyt, Mateo Val...
130
Voted
IJISEC
2008
119views more  IJISEC 2008»
15 years 4 months ago
Estimating the maximum information leakage
Preventing improper information leaks is a greatest challenge of the modern society. In this paper we present a technique for measuring the ability of several families of adversari...
Alessandro Aldini, Alessandra Di Pierro
IIE
2006
108views more  IIE 2006»
15 years 4 months ago
The IOI is (not) a Science Olympiad
Abstract. The International Olympiad in Informatics (IOI) aspires to be a science olympiad alongside such international olympiads in mathematics, physics, chemistry, and biology. I...
Tom Verhoeff
IJWIN
2006
209views more  IJWIN 2006»
15 years 3 months ago
On Connected Multiple Point Coverage in Wireless Sensor Networks
Abstract-- We consider a wireless sensor network consisting of a set of sensors deployed randomly. A point in the monitored area is covered if it is within the sensing range of a s...
Shuhui Yang, Fei Dai, Mihaela Cardei, Jie Wu, Floy...
« Prev « First page 1131 / 1392 Last » Next »