The ISMARA client

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The ISMARA client

ISMARA ( ismara.unibas.ch) automatically infers the key regulators and regulatory interactions from high-throughput gene expression or chromatin state data. However, given the large sizes of current next generation sequencing (NGS) datasets, data uploading times are a major bottleneck. Additionally, for proprietary data, users may be uncomfortable with uploading entire raw datasets to an extern...

متن کامل

Client Client Client Client

With the advances in multimedia databases and the popularization of the Internet, it is now possible to access large multimedia data repositories distributed throughout the world. One of the challenging problems in such an access is how the information in the respective databases can be summarized to enable an intelligent selection of relevant database sites based on visual queries. This paper ...

متن کامل

2 System Model and Notation Client Client Client MIDDLEWARE

Component software, distribution, and the use of clusters of workstations are all key trends in today's technology. Little attention has been paid, however, to the network bandwidth required for data intensive applications. In the context of databases, much work has been done in parallelization strategies for monolithic architectures with dedicated, specialized networks or over disk arrays. We ...

متن کامل

The k-Client Problem

Virtually all previous research in on-line algorithms has focused on single-threaded systems where only a single sequence of requests compete for system resources. To model multi-threaded on-line systems, we define and analyze the k-client problem, a dual of the well-studied k-server problem. In the basic k-client problem, there is a single server and k clients, each of which generates a sequen...

متن کامل

Securing the Network Client∗

We enumerate and compare a number of security-enabling architectures for network clients. These architectures, either proposed as methodologies or currently implemented in software and/or hardware, are capable of protecting the client’s software integrity and its environment. The most important methodologies include the reference monitor model, firewalls and virtual machines. Software implement...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: F1000Research

سال: 2016

ISSN: 2046-1402

DOI: 10.12688/f1000research.9794.1