Sciweavers

1748 search results - page 95 / 350
» Acceleration of the EM algorithm
Sort
View
SIGMOD
2003
ACM
190views Database» more  SIGMOD 2003»
16 years 1 months ago
Hardware Acceleration for Spatial Selections and Joins
Spatial database operations are typically performed in two steps. In the filtering step, indexes and the minimum bounding rectangles (MBRs) of the objects are used to quickly dete...
Chengyu Sun, Divyakant Agrawal, Amr El Abbadi
IWNAS
2008
IEEE
15 years 8 months ago
A Novel Embedded Accelerator for Online Detection of Shrew DDoS Attacks
∗ As one type of stealthy and hard-to-detect attack, lowrate TCP-targeted DDoS attack can seriously throttle the throughput of normal TCP flows for a long time without being noti...
Hao Chen, Yu Chen
GECCO
2007
Springer
180views Optimization» more  GECCO 2007»
15 years 7 months ago
Exploiting multiple robots to accelerate self-modeling
In previous work [8] a computational framework was demonstrated that allows a mobile robot to autonomously evolve models its own body for the purposes of adaptive behavior generat...
Josh C. Bongard
IPPS
2006
IEEE
15 years 7 months ago
Acceleration of a content-based image-retrieval application on the RDISK cluster
Because of the growing use of multimedia content over Internet, Content-Based Image Retrieval (CBIR) has recently received a lot of interest. While accurate search techniques base...
Auguste Noumsi, Steven Derrien, Patrice Quinton
ITCC
2005
IEEE
15 years 7 months ago
Fast Parallel Table Lookups to Accelerate Symmetric-Key Cryptography
1 Table lookups are one of the most frequently-used operations in symmetric-key ciphers. Particularly in the newer algorithms such as the Advanced Encryption Standard (AES), we fr...
A. Murat Fiskiran, Ruby B. Lee