Sciweavers

1559 search results - page 269 / 312
» The Semantics of Future and Its Use in Program Optimizations
Sort
View
BMCBI
2008
142views more  BMCBI 2008»
14 years 10 months ago
Strategies for measuring evolutionary conservation of RNA secondary structures
Background: Evolutionary conservation of RNA secondary structure is a typical feature of many functional non-coding RNAs. Since almost all of the available methods used for predic...
Andreas R. Gruber, Stephan H. F. Bernhart, Ivo L. ...
BMCBI
2006
136views more  BMCBI 2006»
14 years 9 months ago
Java GUI for InterProScan (JIPS): A tool to help process multiple InterProScans and perform ortholog analysis
Background: Recent, rapid growth in the quantity of available genomic data has generated many protein sequences that are not yet biochemically classified. Thus, the prediction of ...
Aijazuddin Syed, Chris Upton
ISCA
2011
IEEE
294views Hardware» more  ISCA 2011»
14 years 1 months ago
Moguls: a model to explore the memory hierarchy for bandwidth improvements
In recent years, the increasing number of processor cores and limited increases in main memory bandwidth have led to the problem of the bandwidth wall, where memory bandwidth is b...
Guangyu Sun, Christopher J. Hughes, Changkyu Kim, ...
ESOP
2008
Springer
14 years 11 months ago
A Formal Implementation of Value Commitment
In an optimistic approach to security, one can often simplify protocol design by relying on audit logs, which can be analyzed a posteriori. Such auditing is widely used in practice...
Cédric Fournet, Nataliya Guts, Francesco Za...
ASPLOS
2008
ACM
14 years 11 months ago
Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems
Commodity operating systems entrusted with securing sensitive data are remarkably large and complex, and consequently, frequently prone to compromise. To address this limitation, ...
Xiaoxin Chen, Tal Garfinkel, E. Christopher Lewis,...