Sciweavers

9 search results - page 2 / 2
» Scalable Detection and Isolation of Phishing
Sort
View
ISCA
2007
IEEE
174views Hardware» more  ISCA 2007»
13 years 11 months ago
An integrated hardware-software approach to flexible transactional memory
There has been considerable recent interest in the support of transactional memory (TM) in both hardware and software. We present an intermediate approach, in which hardware is us...
Arrvindh Shriraman, Michael F. Spear, Hemayet Hoss...
SYNASC
2005
IEEE
98views Algorithms» more  SYNASC 2005»
13 years 10 months ago
Archeology of Code Duplication: Recovering Duplication Chains from Small Duplication Fragments
Code duplication is a common problem, and a wellknown sign of bad design. As a result of that, in the last decade, the issue of detecting code duplication led to various solutions...
Richard Wettel, Radu Marinescu
VLSID
2004
IEEE
212views VLSI» more  VLSID 2004»
14 years 5 months ago
On Design and Implementation of an Embedded Automatic Speech Recognition System
We present a new design of an Embedded Speech Recognition System. It combines the aspects of both hardware and software design to implement a speaker dependent, isolated word, sma...
Sujay Phadke, Rhishikesh Limaye, Siddharth Verma, ...
USS
2004
13 years 6 months ago
Avfs: An On-Access Anti-Virus File System
Viruses and other malicious programs are an everincreasing threat to current computer systems. They can cause serious damage and consume countless hours of system administrators&#...
Yevgeniy Miretskiy, Abhijith Das, Charles P. Wrigh...