Sciweavers

2219 search results - page 223 / 444
» Dynamic Programming and Graph Algorithms in Computer Vision
Sort
View
133
Voted
PODC
2005
ACM
15 years 8 months ago
On the locality of bounded growth
Many large-scale networks such as ad hoc and sensor networks, peer-to-peer networks, or the Internet have the property that the number of independent nodes does not grow arbitrari...
Fabian Kuhn, Thomas Moscibroda, Roger Wattenhofer
BIBM
2008
IEEE
110views Bioinformatics» more  BIBM 2008»
15 years 9 months ago
Genome Alignments Using MPI-LAGAN
We develop a parallel algorithm for a widely used whole genome alignment method called LAGAN. We use the MPI-based protocol to develop parallel solutions for two phases of the alg...
Ruinan Zhang, Huzefa Rangwala, George Karypis
FPL
2007
Springer
99views Hardware» more  FPL 2007»
15 years 7 months ago
Disjoint Pattern Enumeration for Custom Instructions Identification
Extensible processors allow addition of application-specific custom instructions to the core instruction set architecture. These custom instructions are selected through an analys...
Pan Yu, Tulika Mitra
AC
2004
Springer
15 years 3 months ago
Shotgun Sequence Assembly
Shotgun sequencing is the most widely used technique for determining the DNA sequence of organisms. It involves breaking up the DNA into many small pieces that can be read by auto...
Mihai Pop
SP
2009
IEEE
262views Security Privacy» more  SP 2009»
15 years 10 months ago
Automatic Reverse Engineering of Malware Emulators
Malware authors have recently begun using emulation technology to obfuscate their code. They convert native malware binaries into bytecode programs written in a randomly generated...
Monirul I. Sharif, Andrea Lanzi, Jonathon T. Giffi...