DNA分子计算模型

来源 :计算机科学 | 被引量 : 0次 | 上传用户:huojiantong
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
The field of practical DNA computing opened in 1994 with Adleman's paper,in which a laboratory experi-ment involving DNA molecules was used to solve a small instance of the Hamiltonian Path problem. The characteris-tic of this computation is its power
其他文献
本文介绍了网格的基本概念,结合工作流任务的服务质量(QoS)需求,提出了基于服务质量的网格工作流调度算法,对GGWF算法中的LGSS算法做了改进,提出了ILGSS算法,对该算法的算法复杂度
This paper investigates and summarizes the basic concept of Web Service, covers how to set up the fundamental Web Service structure on WebSphere platform with t
WWW规模的飞速发展对普通搜索引擎覆盖一切的目标提出了挑战.对于关注具体主题的用户,普通搜索引擎并不完全适用.近年来聚焦于单一主题的WWW检索逐渐受到重视,本文在此基础上
软件开发模型很多,基于Web的三层结构的软件设计开发模型的关键是要考虑它的并发性。本文提出一种基于分层Petri网的Web软件开发模型。该模型对基本有限自动机进行了扩充;将扩
Among the network devices used for high performance parallel computing, Myrinet and Gigabit-Ethernetare relatively more widely applied. The modification in arch
1研究背景对象以其良好的模块化和重用性,已经在软件设计和开发过程中得到广泛的应用.面向对象的理论已成为计算机领域的一个研究热点.
Based on role object, the Business Process Reengineering (BPR) is quickly implemented by constructingthe frame of role model. This technology will be widely app
There are two well-known characteristics about text classification. One is that the dimension of the sample space is very high, while the number of examples ava
Web Cluster is an effective mechanism used in Web site construction to deal with the system capacity prob-lem. Researchers proposed several strategies or algori
Security protocols use cryptography system to complete the tasks of principal identity authentication andseccion key distribution. The correctness of security p