Sciweavers

8398 search results - page 1549 / 1680
» Optimal Software Testing
Sort
View
117
Voted
EMSOFT
2008
Springer
15 years 2 months ago
Workload-based configuration of MEMS-based storage devices for mobile systems
Because of its small form factor, high capacity, and expected low cost, MEMS-based storage is a suitable storage technology for mobile systems. However, flash memory may outperfor...
Mohammed G. Khatib, Ethan L. Miller, Pieter H. Har...
122
Voted
CCS
2010
ACM
15 years 1 months ago
TASTY: tool for automating secure two-party computations
Secure two-party computation allows two untrusting parties to jointly compute an arbitrary function on their respective private inputs while revealing no information beyond the ou...
Wilko Henecka, Stefan Kögl, Ahmad-Reza Sadegh...
AC
2008
Springer
15 years 1 months ago
Computing with RFID- Drivers, Technology and Implications
Radio Frequency Identification or simply rfid has come to be an integral part of modern computing. Rfid is notable in that it is the first practical technology to tightly couple p...
George Roussos
BMCBI
2008
179views more  BMCBI 2008»
15 years 1 months ago
Bayesian modeling of recombination events in bacterial populations
Background: We consider the discovery of recombinant segments jointly with their origins within multilocus DNA sequences from bacteria representing heterogeneous populations of fa...
Pekka Marttinen, Adam Baldwin, William P. Hanage, ...
BMCBI
2008
117views more  BMCBI 2008»
15 years 1 months ago
CrossHybDetector: detection of cross-hybridization events in DNA microarray experiments
Background: DNA microarrays contain thousands of different probe sequences represented on their surface. These are designed in such a way that potential cross-hybridization reacti...
Paolo Uva, Emanuele de Rinaldis
« Prev « First page 1549 / 1680 Last » Next »