Sciweavers

1474 search results - page 169 / 295
» Exploiting Locality in a TMS
Sort
View
107
Voted
ALGORITHMICA
2007
70views more  ALGORITHMICA 2007»
15 years 4 months ago
Sampling Conformation Space to Model Equilibrium Fluctuations in Proteins
This paper proposes the Protein Ensemble Method (PEM) to model equilibrium fluctuations in proteins where fragments of the protein polypeptide chain can move independently of one ...
Amarda Shehu, Cecilia Clementi, Lydia E. Kavraki
CEE
2008
119views more  CEE 2008»
15 years 4 months ago
A clustering-based prefetching scheme on a Web cache environment
Web prefetching is an attractive solution to reduce the network resources consumed by Web services as well as the access latencies perceived by Web users. Unlike Web caching, whic...
George Pallis, Athena Vakali, Jaroslav Pokorn&yacu...
146
Voted
CORR
2007
Springer
131views Education» more  CORR 2007»
15 years 4 months ago
How to use the Scuba Diving metaphor to solve problem with neutrality ?
Abstract. We proposed a new search heuristic using the scuba diving metaphor. This approach is based on the concept of evolvability and tends to exploit neutrality which exists in ...
Philippe Collard, Sébastien Vérel, M...
JMIV
2006
166views more  JMIV 2006»
15 years 4 months ago
Fast Surface Segmentation Guided by User Input Using Implicit Extension of Minimal Paths
We introduce a novel implicit approach for single object segmentation in 3D images. The boundary surface of this object is assumed to contain two or more known curves (the constrai...
Roberto Ardon, Laurent D. Cohen, Anthony J. Yezzi
JSAC
2006
114views more  JSAC 2006»
15 years 4 months ago
SCAN: self-organized network-layer security in mobile ad hoc networks
Protecting the network layer from malicious attacks is an important yet challenging security issue in mobile ad hoc networks. In this paper we describe SCAN, a unified networklayer...
Hao Yang, J. Shu, Xiaoqiao Meng, Songwu Lu