Results 1 - 10
of
6,096
UCSF Chimera—a visualization system for exploratory research and analysis
- J. Comput. Chem
, 2004
"... Abstract: The design, implementation, and capabilities of an extensible visualization system, UCSF Chimera, are discussed. Chimera is segmented into a core that provides basic services and visualization, and extensions that provide most higher level functionality. This architecture ensures that the ..."
Abstract
-
Cited by 504 (7 self)
- Add to MetaCart
Abstract: The design, implementation, and capabilities of an extensible visualization system, UCSF Chimera, are discussed. Chimera is segmented into a core that provides basic services and visualization, and extensions that provide most higher level functionality. This architecture ensures
The spandrels of San Marco and the Panglossian paradigm: a critique of the adaptationist programme.
- Proceedings of the Royal Society of London Series B, Biological Sciences
, 1979
"... An adaptationist programme has dominated evolutionary thought in England and the United States during the past 40 years. It is based on faith in the power of natural selection as an optimizing agent. It proceeds by breaking an organism into unitary 'traits' and proposing an adaptive story ..."
Abstract
-
Cited by 538 (2 self)
- Add to MetaCart
story for each considered separately. Trade-offs among competing selective demands exert the onlv brake upon perfection; non-optimality is thereby rendered as a result of adaptation as well. We criticize this approach and attempt to reassert a competing notion (long popular in continental Europe
Terra: a virtual machine-based platform for trusted computing
, 2003
"... We present a flexible architecture for trusted computing, called Terra, that allows applications with a wide range of security requirements to run simultaneously on commodity hardware. Applications on Terra enjoy the semantics of running on a separate, dedicated, tamper-resistant hardware platform, ..."
Abstract
-
Cited by 431 (5 self)
- Add to MetaCart
We present a flexible architecture for trusted computing, called Terra, that allows applications with a wide range of security requirements to run simultaneously on commodity hardware. Applications on Terra enjoy the semantics of running on a separate, dedicated, tamper-resistant hardware platform
A hidden Markov model for predicting transmembrane helices in protein sequences
- In Proceedings of the 6th International Conference on Intelligent Systems for Molecular Biology (ISMB
, 1998
"... A novel method to model and predict the location and orientation of alpha helices in membrane- spanning proteins is presented. It is based on a hidden Markov model (HMM) with an architecture that corresponds closely to the biological system. The model is cyclic with 7 types of states for helix core, ..."
Abstract
-
Cited by 373 (9 self)
- Add to MetaCart
A novel method to model and predict the location and orientation of alpha helices in membrane- spanning proteins is presented. It is based on a hidden Markov model (HMM) with an architecture that corresponds closely to the biological system. The model is cyclic with 7 types of states for helix core
Rainbow: Architecture-based self-adaptation with reusable infrastructure
- IEEE Computer
, 2004
"... Software-based systems today are increasingly expected to dynamically self-adapt to accommodate resource variability, changing user needs, and system faults. Recent work uses closed-loop control based on external models to monitor and adapt system behavior at run time. Taking this externalized appro ..."
Abstract
-
Cited by 275 (12 self)
- Add to MetaCart
approach, the Rainbow framework we have developed uses software architectural models to dynamically monitor and adapt a running system. A key goal and primary challenge of this framework is to support the reuse of adaptation strategies and infrastructure across different systems. In this poster, we show
Iolus: A Framework for Scalable Secure Multicasting
, 1997
"... As multicast applications are deployed for mainstream use, the need to secure multicast communications will become critical. Multicast, however, does not fit the point-to-point model of most network security protocols which were designed with unicast communications in mind. As we will show, securing ..."
Abstract
-
Cited by 325 (0 self)
- Add to MetaCart
and then propose Iolus: a novel framework for scalable secure multicasting. Protocols based on Iolus can be used to achieve avariety ofsecurity objectives and may be used either to directly secure multicast communications or to provide a separate group key management service to other "
Independent Component Analysis Using an Extended Infomax Algorithm for Mixed Subgaussian and Supergaussian Sources
, 1999
"... An extension of the infomax algorithm of Bell and Sejnowski (1995) is presented that is able blindly to separate mixed signals with sub- and supergaussian source distributions. This was achieved by using a simple type of learning rule first derived by Girolami (1997) by choosing negentropy as a proj ..."
Abstract
-
Cited by 314 (22 self)
- Add to MetaCart
An extension of the infomax algorithm of Bell and Sejnowski (1995) is presented that is able blindly to separate mixed signals with sub- and supergaussian source distributions. This was achieved by using a simple type of learning rule first derived by Girolami (1997) by choosing negentropy as a
Nonlinear Neural Networks: Principles, Mechanisms, and Architectures
, 1988
"... An historical discussion is provided of the intellectual trends that caused nineteenth century interdisciplinary studies of physics and psychobiology by leading scientists such as Helmholtz, Maxwell, and Mach to splinter into separate twentieth-century scientific movements. The nonlinear, nonstatio ..."
Abstract
-
Cited by 262 (21 self)
- Add to MetaCart
An historical discussion is provided of the intellectual trends that caused nineteenth century interdisciplinary studies of physics and psychobiology by leading scientists such as Helmholtz, Maxwell, and Mach to splinter into separate twentieth-century scientific movements. The nonlinear
A Quality of Service Architecture
, 1996
"... ..................................................................... ....... i Acknowledgements ............................................................... ii 1. Introduction .................................................................... 1 2. Quality of Service Terminology, Principles and ..."
Abstract
-
Cited by 220 (23 self)
- Add to MetaCart
.................................................................19 2.2.2 Separation Principle .................................................................19 2.2.3 Transparency Principle............................................................ ..19 2.2.4 Asynchronous Resource Management Principle .................................20 2.2.5 Performance
System-level design: Orthogonalization of concerns and platform-based design
- IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS
, 2000
"... System-level design issues become critical as implementation technology evolves toward increasingly complex integrated circuits and the time-to-market pressure continues relentlessly. To cope with these issues, new methodologies that emphasize re-use at all levels of abstraction are a “must”, and th ..."
Abstract
-
Cited by 272 (10 self)
- Add to MetaCart
”, and this is a major focus of our work in the Gigascale Silicon Research Center. We present some important concepts for system design that are likely to provide at least some of the gains in productivity postulated above. In particular, we focus on a method that separates parts of the design process and makes
Results 1 - 10
of
6,096