Sciweavers

7262 search results - page 355 / 1453
» Reversible Computer Hardware
Sort
View
145
Voted
CHI
2005
ACM
16 years 4 months ago
PINS push in and POUTS pop out: creating a tangible pin-board that ejects physical documents
There is an asymmetry in many tangible interfaces: while phicons can be used to manipulate digital information, the reverse is often not possible ? the digital world cannot push b...
Kher Hui Ng, Steve Benford, Boriana Koleva
RECOMB
2008
Springer
16 years 4 months ago
Hurdles Hardly Have to Be Heeded
Abstract. As data about genomic architecture accumulates, genomic rearrangements have attracted increasing attention. One of the main rearrangement mechanisms, inversions (also cal...
Krister M. Swenson, Yu Lin, Vaibhav Rajan, Bernard...
RECOMB
2007
Springer
16 years 4 months ago
Network Motif Discovery Using Subgraph Enumeration and Symmetry-Breaking
The study of biological networks and network motifs can yield significant new insights into systems biology. Previous methods of discovering network motifs ? network-centric subgra...
Joshua A. Grochow, Manolis Kellis
134
Voted
DCC
2008
IEEE
16 years 3 months ago
Geometric Burrows-Wheeler Transform: Linking Range Searching and Text Indexing
We introduce a new variant of the popular Burrows-Wheeler transform (BWT) called Geometric Burrows-Wheeler Transform (GBWT). Unlike BWT, which merely permutes the text, GBWT conve...
Yu-Feng Chien, Wing-Kai Hon, Rahul Shah, Jeffrey S...
DSN
2008
IEEE
15 years 10 months ago
Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware
Many threats that plague today’s networks (e.g., phishing, botnets, denial of service attacks) are enabled by a complex ecosystem of attack programs commonly called malware. To ...
Xu Chen, Jonathon Andersen, Zhuoqing Morley Mao, M...