Results 1 -
9 of
9
Advance Access publication on September 11, 2009 doi:10.1093/comjnl/bxp086 Accelerating Multiple Sequence Alignment with the Cell BE Processor
, 2009
"... The Cell Broadband Engine (BE) Architecture is a new heterogeneous multi-core architecture targeted at compute-intensive workloads. The architecture of the Cell BE has several features that are unique in high-performance general-purpose processors, most notably the extensive support for vectorizatio ..."
Abstract
- Add to MetaCart
experiences with using the Cell BE architecture to accelerate Clustal W, a bio-informatics program for multiple sequence alignment. We report on how we apply the unique features of the Cell BE to Clustal W and how important each is in obtaining high performance. By making extensive use of vectorization
LumiNet An Organic Interactive Illumination Network Diploma Thesis at the Media Computing Group
"... I hereby declare that I have created this work completely on my own and used no other sources or tools than the ones listed, and that I have marked any citations accordingly. Hiermit versichere ich, dass ich die vorliegende Arbeit selbständig verfasst und keine anderen als die angegebenen Quellen un ..."
Abstract
- Add to MetaCart
I hereby declare that I have created this work completely on my own and used no other sources or tools than the ones listed, and that I have marked any citations accordingly. Hiermit versichere ich, dass ich die vorliegende Arbeit selbständig verfasst und keine anderen als die angegebenen Quellen
doi:10.1093/comjnl/bxp026 A Digest and Pattern Matching-Based Intrusion Detection Engine
, 2008
"... Intrusion detection/prevention systems (IDSs/IPSs) heavily rely on signature databases and pattern matching (PM) techniques to identify network attacks. The engines of such systems often employ traditional PM algorithms to search for telltale patterns in network flows. The observations that real-wor ..."
Abstract
- Add to MetaCart
cannot be determined by fingerprints alone, our framework uses the Boyer–Moore algorithm to ascertain whether attack signatures appear in the stream. To reduce false matches, we resort to multiple fingerprinting techniques including Bloom–Filter and Rabin–Fingerprint. Experimentation with a prototype
SIMULATION, DEVELOPMENT AND DEPLOYMENT OF MOBILE WIRELESS SENSOR NETWORKS FOR MIGRATORY BIRD TRACKING
, 2012
"... This thesis presents CraneTracker, a multi-modal sensing and communication system for monitoring migratory species at the continental level. By exploiting the robust and extensive cellular infrastructure across the continent, traditional mobile wireless sensor networks can be extended to enable reli ..."
Abstract
- Add to MetaCart
This thesis presents CraneTracker, a multi-modal sensing and communication system for monitoring migratory species at the continental level. By exploiting the robust and extensive cellular infrastructure across the continent, traditional mobile wireless sensor networks can be extended to enable
2.1.1 Orthodoxy
"... I discuss Julian Barbour's Machian theories of dynamics, and his proposal that a Machian perspective enables one to solve the problem of time in quantum ge-ometrodynamics (by saying that there is no time!). I concentrate on his recent ..."
Abstract
- Add to MetaCart
I discuss Julian Barbour's Machian theories of dynamics, and his proposal that a Machian perspective enables one to solve the problem of time in quantum ge-ometrodynamics (by saying that there is no time!). I concentrate on his recent
zbw Leibniz-Informationszentrum WirtschaftLeibniz Information Centre for Economics
, 2002
"... Sie dürfen die Dokumente nicht für öffentliche oder kommerzielle ..."