Sciweavers

1040 search results - page 171 / 208
» The Role of Controlled Experiments in Software Engineering R...
Sort
View
BMCBI
2007
181views more  BMCBI 2007»
14 years 12 months ago
Genes2Networks: connecting lists of gene symbols using mammalian protein interactions databases
Background: In recent years, mammalian protein-protein interaction network databases have been developed. The interactions in these databases are either extracted manually from lo...
Seth I. Berger, Jeremy M. Posner, Avi Ma'ayan
PARA
1998
Springer
15 years 4 months ago
Technologies for Teracomputing: A European Option
Abstract. Ahardware and software environment with performance above 1 Tera ops (teracomputing) is presently required to face the leading computational challenges not only in fundam...
Agostino Mathis
EUROSYS
2008
ACM
15 years 9 months ago
Protectit: trusted distributed services operating on sensitive data
Protecting shared sensitive information is a key requirement for today’s distributed applications. Our research uses virtualization technologies to create and maintain trusted d...
Jiantao Kong, Karsten Schwan, Min Lee, Mustaque Ah...
ISMVL
2010
IEEE
209views Hardware» more  ISMVL 2010»
15 years 4 months ago
Secure Design Flow for Asynchronous Multi-valued Logic Circuits
—The purpose of secure devices such as smartcards is to protect secret information against software and hardware attacks. Implementation of the appropriate protection techniques ...
Ashur Rafiev, Julian P. Murphy, Alexandre Yakovlev
JAVA
2001
Springer
15 years 4 months ago
High-performance Java codes for computational fluid dynamics
The computational science community is reluctant to write largescale computationally-intensive applications in Java due to concerns over Java’s poor performance, despite the cla...
Christopher Riley, Siddhartha Chatterjee, Rupak Bi...