Sciweavers

2503 search results - page 188 / 501
» Building Computer Network Attacks
Sort
View
109
Voted
CVPR
2010
IEEE
15 years 2 months ago
Deconvolutional networks
Building robust low and mid-level image representations, beyond edge primitives, is a long-standing goal in vision. Many existing feature detectors spatially pool edge information...
Matthew D. Zeiler, Dilip Krishnan, Graham W. Taylo...
IDEAL
2010
Springer
15 years 12 days ago
Typed Linear Chain Conditional Random Fields and Their Application to Intrusion Detection
Intrusion detection in computer networks faces the problem of a large number of both false alarms and unrecognized attacks. To improve the precision of detection, various machine l...
Carsten Elfers, Mirko Horstmann, Karsten Sohr, Ott...
ICPADS
2006
IEEE
15 years 8 months ago
Scalable Hybrid Designs for Linear Algebra on Reconfigurable Computing Systems
—Recently, high-end reconfigurable computing systems that employ Field-Programmable Gate Arrays (FPGAs) as hardware accelerators for general-purpose processors have been built. T...
Ling Zhuo, Viktor K. Prasanna
157
Voted
HPCN
1999
Springer
15 years 6 months ago
Data Intensive Distributed Computing; A Medical Application Example
Modern scientific computing involves organizing, moving, visualizing, and analyzing massive amounts of data from around the world, as well as employing large-scale computation. The...
Jason Lee, Brian Tierney, William E. Johnston
ICPPW
2009
IEEE
15 years 8 months ago
Audio-Based Self-Organizing Authentication for Pervasive Computing: A Cyber-Physical Approach
—Pervasive computing is fast becoming a reality with rapid advance in computing and networking technologies. It has the characteristics of scalability, invisibility, and the abse...
Su Jin Kim, Sandeep K. S. Gupta