Sciweavers

144227 search results - page 28526 / 28846
» Using the
Sort
View
JACM
2000
77views more  JACM 2000»
15 years 4 months ago
The fault span of crash failures
A crashing network protocol is an asynchronous protocol whose memory does not survive crashes. We show that a crashing network protocol that works over unreliable links can be driv...
George Varghese, Mahesh Jayaram
JAIR
2000
123views more  JAIR 2000»
15 years 4 months ago
Backbone Fragility and the Local Search Cost Peak
The local search algorithm WSat is one of the most successful algorithms for solving the satisfiability (SAT) problem. It is notably effective at solving hard Random 3-SAT instanc...
Josh Singer, Ian P. Gent, Alan Smaill
JASIS
2000
68views more  JASIS 2000»
15 years 4 months ago
Tropes, history, and ethics in professional discourse and information science
: This paper argues that professional discourses tend to align themselves with dominant ideological and social forces by means of language. In twentieth century modernity, the use ...
Ronald Day
JCB
2000
146views more  JCB 2000»
15 years 4 months ago
Bayesian Segmentation of Protein Secondary Structure
We present a novel method for predicting the secondary structure of a protein from its amino acid sequence. Most existing methods predict each position in turn based on a local wi...
Scott C. Schmidler, Jun S. Liu, Douglas L. Brutlag
JCNS
2000
73views more  JCNS 2000»
15 years 4 months ago
Models of Calmodulin Trapping and CaM Kinase II Activation in a Dendritic Spine
Activation of calcium/calmodulin-dependent protein kinase II (CaMKII) by calmodulin following calcium entry into the cell is important for long-term potentiation (LTP). Here a mode...
William Holmes
« Prev « First page 28526 / 28846 Last » Next »