Sciweavers

2236 search results - page 447 / 448
» Intrusion detection techniques and approaches
Sort
View
EGH
2010
Springer
13 years 3 months ago
GPU random numbers via the tiny encryption algorithm
Random numbers are extensively used on the GPU. As more computation is ported to the GPU, it can no longer be treated as rendering hardware alone. Random number generators (RNG) a...
Fahad Zafar, Marc Olano, Aaron Curtis
ICCAD
2010
IEEE
186views Hardware» more  ICCAD 2010»
13 years 3 months ago
Application-Aware diagnosis of runtime hardware faults
Extreme technology scaling in silicon devices drastically affects reliability, particularly because of runtime failures induced by transistor wearout. Currently available online t...
Andrea Pellegrini, Valeria Bertacco
MICRO
2010
IEEE
202views Hardware» more  MICRO 2010»
13 years 3 days ago
Hardware Support for Relaxed Concurrency Control in Transactional Memory
Today's transactional memory systems implement the two-phase-locking (2PL) algorithm which aborts transactions every time a conflict happens. 2PL is a simple algorithm that pr...
Utku Aydonat, Tarek S. Abdelrahman
BMCBI
2007
165views more  BMCBI 2007»
13 years 5 months ago
Ab initio identification of human microRNAs based on structure motifs
Background: MicroRNAs (miRNAs) are short, non-coding RNA molecules that are directly involved in post-transcriptional regulation of gene expression. The mature miRNA sequence bind...
Markus Brameier, Carsten Wiuf
TFM
2009
Springer
252views Formal Methods» more  TFM 2009»
13 years 12 months ago
Abstraction and Modelling: A Complementary Partnership
action and Modelling - a complementary partnership” 10h30 – 11h 00 Coffee break 11h-12h30 Session 1 “Model Transformation: Foundations” Algebraic models for bidirectional m...
Jeffrey Kramer