Sciweavers

168 search results - page 25 / 34
» Library Functions Timing Characterization for Source-Level A...
Sort
View
88
Voted
CPHYSICS
2006
85views more  CPHYSICS 2006»
14 years 9 months ago
Simulation of n-qubit quantum systems. II. Separability and entanglement
Studies on the entanglement of n-qubit quantum systems have attracted a lot of interest during recent years. Despite the central role of entanglement in quantum information theory...
T. Radtke, S. Fritzsche
CORR
2010
Springer
155views Education» more  CORR 2010»
14 years 4 months ago
A Complexity View of Markets with Social Influence
: In this paper, inspired by the work of Megiddo on the formation of preferences and strategic analysis, we consider an early market model studied in the field of economic theory, ...
Xi Chen, Shang-Hua Teng
SOSP
2007
ACM
15 years 6 months ago
Bouncer: securing software by blocking bad input
Attackers exploit software vulnerabilities to control or crash programs. Bouncer uses existing software instrumentation techniques to detect attacks and it generates filters auto...
Manuel Costa, Miguel Castro, Lidong Zhou, Lintao Z...
WCRE
2003
IEEE
15 years 2 months ago
Toward an environment for comprehending distributed systems
Many modern software systems are often large, distributed, written in more than one programming language, and developed using pre-built components. This paper presents the results...
Maher Salah, Spiros Mancoridis
BMCBI
2004
111views more  BMCBI 2004»
14 years 9 months ago
The Hotdog fold: wrapping up a superfamily of thioesterases and dehydratases
Background: The Hotdog fold was initially identified in the structure of Escherichia coli FabA and subsequently in 4-hydroxybenzoyl-CoA thioesterase from Pseudomonas sp. strain CB...
Shane C. Dillon, Alex Bateman