Sciweavers

1920 search results - page 321 / 384
» The Range Constraint: Algorithms and Implementation
Sort
View
IPPS
2009
IEEE
15 years 4 months ago
Input-independent, scalable and fast string matching on the Cray XMT
String searching is at the core of many security and network applications like search engines, intrusion detection systems, virus scanners and spam filters. The growing size of o...
Oreste Villa, Daniel G. Chavarría-Miranda, ...
SIGCOMM
2006
ACM
15 years 3 months ago
Virtual ring routing: network routing inspired by DHTs
This paper presents Virtual Ring Routing (VRR), a new network routing protocol that occupies a unique point in the design space. VRR is inspired by overlay routing algorithms in D...
Matthew Caesar, Miguel Castro, Edmund B. Nightinga...
SBACPAD
2003
IEEE
138views Hardware» more  SBACPAD 2003»
15 years 3 months ago
Finite Difference Simulations of the Navier-Stokes Equations Using Parallel Distributed Computing
 This paper discusses the implementation of a numerical algorithm for simulating incompressible fluid flows based on the finite difference method and designed for parallel compu...
João Paulo De Angeli, Andréa M. P. V...
BMCBI
2010
119views more  BMCBI 2010»
14 years 10 months ago
Coherent pipeline for biomarker discovery using mass spectrometry and bioinformatics
Background: Robust biomarkers are needed to improve microbial identification and diagnostics. Proteomics methods based on mass spectrometry can be used for the discovery of novel ...
Ali Al-Shahib, Raju Misra, Nadia Ahmod, Min Fang, ...
BMCBI
2008
111views more  BMCBI 2008»
14 years 10 months ago
A perl package and an alignment tool for phylogenetic networks
Background: Phylogenetic networks are a generalization of phylogenetic trees that allow for the representation of evolutionary events acting at the population level, like recombin...
Gabriel Cardona, Francesc Rosselló, Gabriel...