Sciweavers

1427 search results - page 228 / 286
» Achieving High Performance with FPGA-Based Computing
Sort
View
CCS
2007
ACM
15 years 4 months ago
Topological analysis of network attack vulnerability
: To understand overall vulnerability to network attack, one must consider attacker exploits not just in isolation, but also in combination. That is, one must analyze how low-level...
Sushil Jajodia
DAMON
2007
Springer
15 years 4 months ago
In-memory grid files on graphics processors
Recently, graphics processing units, or GPUs, have become a viable alternative as commodity, parallel hardware for generalpurpose computing, due to their massive data-parallelism,...
Ke Yang, Bingsheng He, Rui Fang, Mian Lu, Naga K. ...
ISVC
2007
Springer
15 years 4 months ago
Iris Recognition: An Entropy-Based Coding Strategy Robust to Noisy Imaging Environments
Abstract. The iris is currently accepted as one of the most accurate traits for biometric purposes. However, for the sake of accuracy, iris recognition systems rely on good quality...
Hugo Proença, Luís A. Alexandre
LCN
2005
IEEE
15 years 3 months ago
Light-Trail Networks: Design and Survivability
The light-trail architecture provides a novel solution to address IP-centric issues at the optical layer. By incorporating drop and continue functionality, overlaid with a lightwe...
Srivatsan Balasubramanian, Wensheng He, Arun K. So...
EUROPAR
2005
Springer
15 years 3 months ago
A Generic Language for Dynamic Adaptation
Today, component oriented middlewares are used to design, develop and deploy distributed applications easily. They ensure the heterogeneity, interoperability, and reuse of software...
Assia Hachichi, Gaël Thomas, Cyril Martin, Be...