Sciweavers

5863 search results - page 187 / 1173
» An evaluation of the TRIPS computer system
Sort
View
ISPASS
2009
IEEE
15 years 8 months ago
Evaluating GPUs for network packet signature matching
Modern network devices employ deep packet inspection to enable sophisticated services such as intrusion detection, traffic shaping, and load balancing. At the heart of such servi...
Randy Smith, Neelam Goyal, Justin Ormont, Karthike...
104
Voted
PEPM
1991
ACM
15 years 5 months ago
Properties of Unfolding-based Meta-level Systems
It is well known that the performance of a program can often be improved by means of program transformation. Several program transformation techniques, eg. partial evaluation, wor...
Torben Amtoft Hansen
102
Voted
CORR
2010
Springer
83views Education» more  CORR 2010»
15 years 2 months ago
Swapping Evaluation: A Memory-Scalable Solution for Answer-On-Demand Tabling
One of the differences among the various approaches to suspension-based tabled evaluation is the scheduling strategy. The two most popular strategies are local and batched evaluat...
Pablo Chico de Guzmán, Manuel Carro, David ...
WWW
2011
ACM
14 years 8 months ago
A case for query by image and text content: searching computer help using screenshots and keywords
The multimedia information retrieval community has dedicated extensive research effort to the problem of content-based image retrieval (CBIR). However, these systems find their ma...
Tom Yeh, Brandyn White, Jose San Pedro, Boris Katz...
IJNSEC
2008
131views more  IJNSEC 2008»
15 years 1 months ago
Performance Analysis of Soft Computing Based Anomaly Detectors
Anomaly detectors have become a necessary component of the computer and information security framework. Some of the numerous drawbacks experienced by the current Anomaly detectors...
N. Srinivasan, V. Vaidehi