Sciweavers

639 search results - page 127 / 128
» A Networked FPGA-Based Hardware Implementation of a Neural N...
Sort
View
IPPS
2009
IEEE
14 years 18 days ago
Input-independent, scalable and fast string matching on the Cray XMT
String searching is at the core of many security and network applications like search engines, intrusion detection systems, virus scanners and spam filters. The growing size of o...
Oreste Villa, Daniel G. Chavarría-Miranda, ...
ECIS
2001
13 years 7 months ago
Thirty Years Later: The Informational and the Evolution of Consciousness
The paper deals with the development of the informational since the IFIP '71 Congress in Ljubljana when the new consciousness evolved to the necessity of nowadays information...
Anton P. Zeleznikar
TWC
2008
201views more  TWC 2008»
13 years 5 months ago
A Novel Algorithm for Multipath Fingerprinting in Indoor WLAN Environments
Abstract--Positioning in indoor wireless environments is growing rapidly in importance and gains commercial interests in context-awareness applications. The essential challenge in ...
Shih-Hau Fang, Tsung-Nan Lin, Kun-Chou Lee
ICSE
2000
IEEE-ACM
13 years 9 months ago
Software engineering for security: a roadmap
Is there such a thing anymore as a software system that doesn't need to be secure? Almost every softwarecontrolled system faces threats from potential adversaries, from Inter...
Premkumar T. Devanbu, Stuart G. Stubblebine
NOMS
2010
IEEE
180views Communications» more  NOMS 2010»
13 years 4 months ago
Exploiting non-dedicated resources for cloud computing
—Popular web services and applications such as Google Apps, DropBox, and Go.Pc introduce a wasteful imbalance of processing resources. Each host operated by a provider serves hun...
Artur Andrzejak, Derrick Kondo, David P. Anderson