Sciweavers

1777 search results - page 169 / 356
» Programming Cryptographic Protocols
Sort
View
CAV
2012
Springer
223views Hardware» more  CAV 2012»
13 years 3 months ago
Detecting Fair Non-termination in Multithreaded Programs
Abstract. We develop compositional analysis algorithms for detecting nontermination in multithreaded programs. Our analysis explores fair and ultimatelyperiodic executions—i.e., ...
Mohamed Faouzi Atig, Ahmed Bouajjani, Michael Emmi...
PPOPP
2010
ACM
15 years 10 months ago
Scalable communication protocols for dynamic sparse data exchange
Many large-scale parallel programs follow a bulk synchronous parallel (BSP) structure with distinct computation and communication phases. Although the communication phase in such ...
Torsten Hoefler, Christian Siebert, Andrew Lumsdai...
BMCBI
2010
208views more  BMCBI 2010»
15 years 1 months ago
Using machine learning to speed up manual image annotation: application to a 3D imaging protocol for measuring single cell gene
Background: Image analysis is an essential component in many biological experiments that study gene expression, cell cycle progression, and protein localization. A protocol for tr...
Zafer Aydin, John I. Murray, Robert H. Waterston, ...
BMCBI
2008
133views more  BMCBI 2008»
15 years 1 months ago
MS-DOCK: Accurate multiple conformation generator and rigid docking protocol for multi-step virtual ligand screening
Background: The number of protein targets with a known or predicted tri-dimensional structure and of drug-like chemical compounds is growing rapidly and so is the need for new the...
Nicolas Sauton, David Lagorce, Bruno O. Villoutrei...
TON
2012
13 years 3 months ago
A Transport Protocol to Exploit Multipath Diversity in Wireless Networks
Abstract—Wireless networks (including wireless mesh networks) provide opportunities for using multiple paths. Multihoming of hosts, possibly using different technologies and prov...
Vicky Sharma, Koushik Kar, K. K. Ramakrishnan, Shi...