Sciweavers

5843 search results - page 1040 / 1169
» Software Security in Practice
Sort
View
FPL
2004
Springer
109views Hardware» more  FPL 2004»
15 years 9 months ago
Hardware Accelerated Novel Protein Identification
The proteins in living organisms perform almost every significant function that governs life. A protein's functionality depends upon its physical structure, which depends on i...
Anish Alex, Jonathan Rose, Ruth Isserlin-Weinberge...
ISSAC
2004
Springer
159views Mathematics» more  ISSAC 2004»
15 years 9 months ago
Complexity issues in bivariate polynomial factorization
Many polynomial factorization algorithms rely on Hensel lifting and factor recombination. For bivariate polynomials we show that lifting the factors up to a precision linear in th...
Alin Bostan, Grégoire Lecerf, Bruno Salvy, ...
WABI
2004
Springer
142views Bioinformatics» more  WABI 2004»
15 years 9 months ago
Linear Reduction for Haplotype Inference
Abstract. Haplotype inference problem asks for a set of haplotypes explaining a given set of genotypes. Popular software tools for haplotype inference (e.g., PHASE, HAPLOTYPER) as ...
Jingwu He, Alexander Zelikovsky
DSN
2003
IEEE
15 years 9 months ago
N-Way Fail-Over Infrastructure for Reliable Servers and Routers
Maintaining the availability of critical servers and routers is an important concern for many organizations. At the lowest level, IP addresses represent the global namespace by wh...
Yair Amir, Ryan Caudy, Ashima Munjal, Theo Schloss...
HICSS
2003
IEEE
116views Biometrics» more  HICSS 2003»
15 years 9 months ago
XML Based Robust Client-Server Communication for a Distributed Telecommunication Management System
Our Distributed Telecommunication Management System (DTMS) uses an object-oriented model to describe the networked Voice Communication System (VCS) to be managed. In order to allo...
Karl M. Göschka, Helmut Reis, Robert Smeikal
« Prev « First page 1040 / 1169 Last » Next »