Sciweavers

1355 search results - page 168 / 271
» On the multiplication groups of semifields
Sort
View
98
Voted
CASES
2010
ACM
14 years 8 months ago
Low cost multicast authentication via validity voting in time-triggered embedded control networks
Wired embedded networks must include multicast authentication to prevent masquerade attacks within the network. However, unique constraints for these networks make most existing m...
Christopher Szilagyi, Philip Koopman
MICRO
2010
IEEE
210views Hardware» more  MICRO 2010»
14 years 8 months ago
Thread Cluster Memory Scheduling: Exploiting Differences in Memory Access Behavior
In a modern chip-multiprocessor system, memory is a shared resource among multiple concurrently executing threads. The memory scheduling algorithm should resolve memory contention...
Yoongu Kim, Michael Papamichael, Onur Mutlu, Mor H...
CIVR
2010
Springer
227views Image Analysis» more  CIVR 2010»
14 years 7 months ago
Evaluating detection of near duplicate video segments
The automatic detection of near duplicate video segments, such as multiple takes of a scene or different news video clips showing the same event, has received growing research int...
Werner Bailer
BMCBI
2010
117views more  BMCBI 2010»
14 years 5 months ago
Screensaver: an open source lab information management system (LIMS) for high throughput screening facilities
Background: Shared-usage high throughput screening (HTS) facilities are becoming more common in academe as large-scale small molecule and genome-scale RNAi screening strategies ar...
Andrew N. Tolopko, John P. Sullivan, Sean D. Erick...
BMCBI
2011
14 years 5 months ago
Meta-analysis of gene expression microarrays with missing replicates
Background: Many different microarray experiments are publicly available today. It is natural to ask whether different experiments for the same phenotypic conditions can be combin...
Fan Shi, Gad Abraham, Christopher Leckie, Izhak Ha...