Sciweavers

1102 search results - page 196 / 221
» Distributed Key Generation for the Internet
Sort
View
ACSAC
2009
IEEE
15 years 6 months ago
Justifying Integrity Using a Virtual Machine Verifier
Emerging distributed computing architectures, such as grid and cloud computing, depend on the high integrity execution of each system in the computation. While integrity measuremen...
Joshua Schiffman, Thomas Moyer, Christopher Shal, ...
IOPADS
1997
152views more  IOPADS 1997»
15 years 3 months ago
Competitive Parallel Disk Prefetching and Buffer Management
We provide a competitive analysis framework for online prefetching and buffer management algorithms in parallel I/O systems, using a read-once model of block references. This has ...
Rakesh D. Barve, Mahesh Kallahalla, Peter J. Varma...
BMCBI
2004
150views more  BMCBI 2004»
15 years 1 months ago
Rank Difference Analysis of Microarrays (RDAM), a novel approach to statistical analysis of microarray expression profiling data
Background: A key step in the analysis of microarray expression profiling data is the identification of genes that display statistically significant changes in expression signals ...
Dietmar E. Martin, Philippe Demougin, Michael N. H...
ICCAD
2009
IEEE
87views Hardware» more  ICCAD 2009»
14 years 11 months ago
Mitigation of intra-array SRAM variability using adaptive voltage architecture
SRAM cell design is driven by the need to satisfy static noise margin, write margin and read current margin (RCM) over all cells in the array in an energy-efficient manner. These ...
Ashish Kumar Singh, Ku He, Constantine Caramanis, ...
ATAL
2003
Springer
15 years 7 months ago
Role allocation and reallocation in multiagent teams: towards a practical analysis
Despite the success of the BDI approach to agent teamwork, initial role allocation (i.e. deciding which agents to allocate to key roles in the team) and role reallocation upon fai...
Ranjit Nair, Milind Tambe, Stacy Marsella