Sciweavers

220 search results - page 28 / 44
» Verifying a signature architecture: a comparative case study
Sort
View
DNIS
2005
Springer
112views Database» more  DNIS 2005»
15 years 5 months ago
Modelling Peer-to-Peer Data Networks Under Complex System Theory
: A Peer-to-peer Data Network (PDN) is an open and evolving society of peer nodes that assemble into a network to share their data for mutual benefit. PDNs are enabled by distribu...
Cyrus Shahabi, Farnoush Banaei Kashani
BMCBI
2008
115views more  BMCBI 2008»
14 years 12 months ago
Principal components analysis based methodology to identify differentially expressed genes in time-course microarray data
Background: Time-course microarray experiments are being increasingly used to characterize dynamic biological processes. In these experiments, the goal is to identify genes differ...
Sudhakar Jonnalagadda, Rajagopalan Srinivasan
CASES
2001
ACM
15 years 3 months ago
The very portable optimizer for digital signal processors
Although retargetability has been a major design concern for many compilers, retargetability is a vitally important issue for Digital Signal Processors(DSPs) because the architect...
Sungjoon Jung, Yunheung Paek
74
Voted
SIGSOFT
2005
ACM
16 years 14 days ago
Surveying the factors that influence maintainability: research design
We want to explore and analyse design decisions that influence maintainability of software. Software maintainability is important because the effort expended on changes and fixes ...
Wiebe Hordijk, Roel Wieringa
VLDB
2007
ACM
138views Database» more  VLDB 2007»
15 years 12 months ago
CADS: Continuous Authentication on Data Streams
We study processing and authentication of long-running queries on outsourced data streams. In this scenario, a data owner (DO) constantly transmits its data to a service provider ...
Stavros Papadopoulos, Yin Yang, Dimitris Papadias