Sciweavers

9006 search results - page 1503 / 1802
» Modeling Software
Sort
View
124
Voted
FIRSTMONDAY
2007
61views more  FIRSTMONDAY 2007»
15 years 4 months ago
Implementing openness: An international institutional perspective
The debate on “openness” has tended to focus on standard setting, software copyrights, patent policy and collaborative innovation models – large issues that evoke heated deb...
Sacha Wunsch-Vincent, Taylor Reynolds, Andrew Wyck...
150
Voted
TCAD
2010
105views more  TCAD 2010»
14 years 11 months ago
Fault Tolerant Network on Chip Switching With Graceful Performance Degradation
The structural redundancy inherent to on-chip interconnection networks [networks on chip (NoC)] can be exploited by adaptive routing algorithms in order to provide connectivity eve...
Adán Kohler, Gert Schley, Martin Radetzki
122
Voted
ICDCS
2010
IEEE
15 years 8 months ago
Existence Theorems and Approximation Algorithms for Generalized Network Security Games
—Aspnes et al [2] introduced an innovative game for modeling the containment of the spread of viruses and worms (security breaches) in a network. In this model, nodes choose to i...
V. S. Anil Kumar, Rajmohan Rajaraman, Zhifeng Sun,...
BMCBI
2010
191views more  BMCBI 2010»
15 years 4 months ago
BiGG: a Biochemical Genetic and Genomic knowledgebase of large scale metabolic reconstructions
Background: Genome-scale metabolic reconstructions under the Constraint Based Reconstruction and Analysis (COBRA) framework are valuable tools for analyzing the metabolic capabili...
Jan Schellenberger, Junyoung O. Park, Tom M. Conra...
ISCA
1999
IEEE
187views Hardware» more  ISCA 1999»
15 years 9 months ago
Area Efficient Architectures for Information Integrity in Cache Memories
Information integrity in cache memories is a fundamental requirement for dependable computing. Conventional architectures for enhancing cache reliability using check codes make it...
Seongwoo Kim, Arun K. Somani
« Prev « First page 1503 / 1802 Last » Next »