Sciweavers

3571 search results - page 630 / 715
» On the Power of Imperfect Information
Sort
View
TC
2008
14 years 11 months ago
Computationally Efficient PKI-Based Single Sign-On Protocol, PKASSO for Mobile Devices
In an attempt to expand Public Key Infrastructure (PKI) usage to a ubiquitous and mobile computing environment, we found that the deployment of the PKI on a resource-constrained de...
Ki-Woong Park, Sang Seok Lim, Kyu Ho Park
TCAD
2008
127views more  TCAD 2008»
14 years 11 months ago
Speculative Loop-Pipelining in Binary Translation for Hardware Acceleration
Abstract--Multimedia and DSP applications have several computationally intensive kernels which are often offloaded and accelerated by application-specific hardware. This paper pres...
Sejong Oh, Tag Gon Kim, Jeonghun Cho, Elaheh Bozor...
TCBB
2008
115views more  TCBB 2008»
14 years 11 months ago
Highly Scalable Genotype Phasing by Entropy Minimization
A Single Nucleotide Polymorphism (SNP) is a position in the genome at which two or more of the possible four nucleotides occur in a large percentage of the population. SNPs accoun...
Alexander Gusev, Ion I. Mandoiu, Bogdan Pasaniuc
TCBB
2008
126views more  TCBB 2008»
14 years 11 months ago
Graphical Models of Residue Coupling in Protein Families
Abstract-- Many statistical measures and algorithmic techniques have been proposed for studying residue coupling in protein families. Generally speaking, two residue positions are ...
John Thomas, Naren Ramakrishnan, Chris Bailey-Kell...
BMCBI
2005
179views more  BMCBI 2005»
14 years 11 months ago
MARS: Microarray analysis, retrieval, and storage system
Background: Microarray analysis has become a widely used technique for the study of geneexpression patterns on a genomic scale. As more and more laboratories are adopting microarr...
Michael Maurer, Robert Molidor, Alexander Sturn, J...