Sciweavers

6833 search results - page 1294 / 1367
» Some two-character sets
Sort
View
ASPLOS
2008
ACM
14 years 12 months ago
Feedback-driven threading: power-efficient and high-performance execution of multi-threaded workloads on CMPs
Extracting high-performance from the emerging Chip Multiprocessors (CMPs) requires that the application be divided into multiple threads. Each thread executes on a separate core t...
M. Aater Suleman, Moinuddin K. Qureshi, Yale N. Pa...
BIRD
2008
Springer
162views Bioinformatics» more  BIRD 2008»
14 years 12 months ago
Suffix Tree Characterization of Maximal Motifs in Biological Sequences
Finding motifs in biological sequences is one of the most intriguing problems for string algorithms designers due to, on the one hand, the numerous applications of this problem in...
Maria Federico, Nadia Pisanti
ICDCS
2010
IEEE
14 years 12 months ago
Distributed Coverage in Wireless Ad Hoc and Sensor Networks by Topological Graph Approaches
Abstract—Coverage problem is a fundamental issue in wireless ad hoc and sensor networks. Previous techniques for coverage scheduling often require accurate location information o...
Dezun Dong, Yunhao Liu, Kebin Liu, Xiangke Liao
CDC
2008
IEEE
129views Control Systems» more  CDC 2008»
14 years 12 months ago
Observer-based control of discrete-time piecewise affine systems: Exploiting continuity twice
Output-based feedback control of discrete-time hybrid systems is an important problem, as in practice it is rarely the case that the full state variable is available for feedback. ...
Maurice Heemels, Mircea Lazar, Nathan van de Wouw,...
CEAS
2008
Springer
14 years 12 months ago
The Effectiveness of Whitelisting: a User-Study
We believe this paper is the first extensive user-study of whitelisting email addresses. While whitelists are common in social networking and instant messaging (e.g., buddylists),...
David Erickson, Martin Casado, Nick McKeown
« Prev « First page 1294 / 1367 Last » Next »