Sciweavers

1661 search results - page 213 / 333
» Real-time specification patterns
Sort
View
BIBM
2010
IEEE
173views Bioinformatics» more  BIBM 2010»
14 years 11 months ago
Network-based identification of smoking-associated gene signature for lung cancer
This study presents a novel computational approach to identifying a smoking-associated gene signature. The methodology contains the following steps: 1) identifying genes significa...
Ying-Wooi Wan, Changchang Xiao, Nancy Lan Guo
MCS
2011
Springer
14 years 8 months ago
Solving macroeconomic models with "off-the-shelf" software: An example of potential pitfalls
: When working with large-scale models or numerous small models, there can be a temptation to rely on default settings in proprietary software to derive solutions to the model. In ...
Ric D. Herbert, Peter J. Stemp
JOC
2010
92views more  JOC 2010»
14 years 8 months ago
Efficient Cache Attacks on AES, and Countermeasures
We describe several software side-channel attacks based on inter-process leakage through the state of the CPU's memory cache. This leakage reveals memory access patterns, whic...
Eran Tromer, Dag Arne Osvik, Adi Shamir
121
Voted
DAC
2002
ACM
16 years 2 months ago
Combined BEM/FEM substrate resistance modeling
For present-day micro-electronic designs, it is becoming ever more important to accurately model substrate coupling effects. Basically, either a Finite Element Method (FEM) or a B...
Eelco Schrik, N. P. van der Meijs
ICSE
2008
IEEE-ACM
16 years 2 months ago
Design and implementation of the software architecture for a 3-D reconstruction system in medical imaging
The design and implementation of the reconstruction system in medical X-ray imaging is a challenging issue due to its immense computational demands. In order to ensure an efficien...
Holger Scherl, Stefan Hoppe, Markus Kowarschik, Jo...