Sciweavers

23119 search results - page 4591 / 4624
» From Domain to Requirements
Sort
View
BMCBI
2010
161views more  BMCBI 2010»
14 years 9 months ago
LTC: a novel algorithm to improve the efficiency of contig assembly for physical mapping in complex genomes
Background: Physical maps are the substrate of genome sequencing and map-based cloning and their construction relies on the accurate assembly of BAC clones into large contigs that...
Zeev Frenkel, Etienne Paux, David I. Mester, Cathe...
BMCBI
2010
126views more  BMCBI 2010»
14 years 9 months ago
PETALS: Proteomic Evaluation and Topological Analysis of a mutated Locus' Signaling
Background: Colon cancer is driven by mutations in a number of genes, the most notorious of which is Apc. Though much of Apc's signaling has been mechanistically identified o...
Gürkan Bebek, Vishal Patel, Mark R. Chance
CAL
2010
14 years 9 months ago
A Case for Alternative Nested Paging Models for Virtualized Systems
Address translation often emerges as a critical performance bottleneck for virtualized systems and has recently been the impetus for hardware paging mechanisms. These mechanisms ap...
Giang Hoang, Chang Bae, Jack Lange, Lide Zhang, Pe...
CN
2010
130views more  CN 2010»
14 years 9 months ago
CoreCast: How core/edge separation can help improving inter-domain live streaming
The rapid growth of broadband access has popularized multimedia services, which nowadays contribute to a large part of Internet traffic. Among this content, the broadcasting of li...
Loránd Jakab, Albert Cabellos-Aparicio, Tho...
CORR
2010
Springer
155views Education» more  CORR 2010»
14 years 9 months ago
A Proof Theoretic Analysis of Intruder Theories
We consider the problem of intruder deduction in security protocol analysis: that is, deciding whether a given message M can be deduced from a set of messages under the theory of ...
Alwen Tiu, Rajeev Goré, Jeremy E. Dawson
« Prev « First page 4591 / 4624 Last » Next »