Sciweavers

928 search results - page 155 / 186
» Towards Design Space Exploration for Biological Systems
Sort
View
P2P
2008
IEEE
137views Communications» more  P2P 2008»
15 years 6 months ago
Hierarchical Codes: How to Make Erasure Codes Attractive for Peer-to-Peer Storage Systems
Redundancy is the basic technique to provide reliability in storage systems consisting of multiple components. A redundancy scheme defines how the redundant data are produced and...
Alessandro Duminuco, Ernst Biersack
SIGMETRICS
2010
ACM
217views Hardware» more  SIGMETRICS 2010»
15 years 23 hour ago
Optimal recovery of single disk failure in RDP code storage systems
Modern storage systems use thousands of inexpensive disks to meet the storage requirement of applications. To enhance the data availability, some form of redundancy is used. For e...
Liping Xiang, Yinlong Xu, John C. S. Lui, Qian Cha...
CODES
2005
IEEE
15 years 5 months ago
Memory access optimizations in instruction-set simulators
Design of programmable processors and embedded applications requires instruction-set simulators for early exploration and validation of candidate architectures. Interpretive simul...
Mehrdad Reshadi, Prabhat Mishra
ASPLOS
2010
ACM
15 years 6 months ago
Accelerating the local outlier factor algorithm on a GPU for intrusion detection systems
The Local Outlier Factor (LOF) is a very powerful anomaly detection method available in machine learning and classification. The algorithm defines the notion of local outlier in...
Malak Alshawabkeh, Byunghyun Jang, David R. Kaeli
BMCBI
2007
94views more  BMCBI 2007»
14 years 12 months ago
Lightweight genome viewer: portable software for browsing genomics data in its chromosomal context
Background: Lightweight genome viewer (lwgv) is a web-based tool for visualization of sequence annotations in their chromosomal context. It performs most of the functions of large...
Jeremiah J. Faith, Andrew J. Olson, Timothy S. Gar...