Sciweavers

2500 search results - page 438 / 500
» Specifying Behavior in C
Sort
View
GECCO
2009
Springer
131views Optimization» more  GECCO 2009»
15 years 1 months ago
A multi-objective approach to data sharing with privacy constraints and preference based objectives
Public data sharing is utilized in a number of businesses to facilitate the exchange of information. Privacy constraints are usually enforced to prevent unwanted inference of info...
Rinku Dewri, Darrell Whitley, Indrajit Ray, Indrak...
IEEEPACT
2009
IEEE
15 years 29 days ago
Adaptive Locks: Combining Transactions and Locks for Efficient Concurrency
Transactional memory is being advanced as an alternative to traditional lock-based synchronization for concurrent programming. Transactional memory simplifies the programming mode...
Takayuki Usui, Reimer Behrends, Jacob Evans, Yanni...
BMCBI
2010
108views more  BMCBI 2010»
14 years 10 months ago
Preferred analysis methods for Affymetrix GeneChips. II. An expanded, balanced, wholly-defined spike-in dataset
Background: Concomitant with the rise in the popularity of DNA microarrays has been a surge of proposed methods for the analysis of microarray data. Fully controlled "spike-i...
Qianqian Zhu, Jeffrey C. Miecznikowski, Marc S. Ha...
BMCBI
2011
14 years 10 months ago
CODA (CrossOver Distribution Analyzer): quantitative characterization of crossover position patterns along chromosomes
Background: During meiosis, homologous chromosomes exchange segments via the formation of crossovers. This phenomenon is highly regulated; in particular, crossovers are distribute...
Franck Gauthier, Olivier C. Martin, Matthieu Falqu...
TON
2010
157views more  TON 2010»
14 years 10 months ago
Random Access Game and Medium Access Control Design
We study the contention/interaction among wireless nodes and med -ium access control design in game theory framework. We define a general class of games, called random access game...
Lijun Chen, Steven H. Low, John C. Doyle