Sciweavers

7080 search results - page 1318 / 1416
» Designing High Integrity Systems Using Aspects
Sort
View
CGO
2010
IEEE
15 years 4 months ago
Taming hardware event samples for FDO compilation
Feedback-directed optimization (FDO) is effective in improving application runtime performance, but has not been widely adopted due to the tedious dual-compilation model, the difï...
Dehao Chen, Neil Vachharajani, Robert Hundt, Shih-...
BMCBI
2010
124views more  BMCBI 2010»
14 years 11 months ago
GPFrontend and GPGraphics: graphical analysis tools for genetic association studies
Background: Most software packages for whole genome association studies are non-graphical, purely text based programs originally designed to run with UNIX-like operating systems. ...
Steffen Uebe, Francesca Pasutto, Mandy Krumbiegel,...
ICRA
1994
IEEE
139views Robotics» more  ICRA 1994»
15 years 3 months ago
Balancing of a Planar Bouncing Object
While most previous work in planning manipulation tasks relies on the assumption of quasi-static conditions, there can be situations where the quasi-static assumption may not hold...
Nina B. Zumel, Michael Erdmann
NC
2008
122views Neural Networks» more  NC 2008»
14 years 11 months ago
Computation with finite stochastic chemical reaction networks
A highly desired part of the synthetic biology toolbox is an embedded chemical microcontroller, capable of autonomously following a logic program specified by a set of instructions...
David Soloveichik, Matthew Cook, Erik Winfree, Jeh...
TPDS
2008
116views more  TPDS 2008»
14 years 11 months ago
Pseudo Trust: Zero-Knowledge Authentication in Anonymous P2Ps
Most trust models in Peer-to-Peer (P2P) systems are identity based, which means that in order for one peer to trust another, it needs to know the other peer's identity. Hence,...
Li Lu, Jinsong Han, Yunhao Liu, Lei Hu, Jinpeng Hu...
« Prev « First page 1318 / 1416 Last » Next »