Sciweavers

20197 search results - page 3551 / 4040
» Comparing Computational Power
Sort
View
CSFW
2004
IEEE
15 years 8 months ago
Using Active Learning in Intrusion Detection
Intrusion Detection Systems (IDSs) have become an important part of operational computer security. They are the last line of defense against malicious hackers and help detect ongo...
Magnus Almgren, Erland Jonsson
136
Voted
DATE
2004
IEEE
154views Hardware» more  DATE 2004»
15 years 8 months ago
MultiNoC: A Multiprocessing System Enabled by a Network on Chip
The MultiNoC system implements a programmable onchip multiprocessing platform built on top of an efficient, low area overhead intra-chip interconnection scheme. The employed inter...
Aline Mello, Leandro Möller, Ney Calazans, Fe...
DSRT
2004
IEEE
15 years 8 months ago
HLA-Based Distributed Simulation Cloning
Distributed simulation cloning technology is designed to analyze alternative scenarios of a distributed simulation concurrently within the same execution session. The goal is to o...
Dan Chen, Stephen John Turner, Boon-Ping Gan, Went...
CHES
2006
Springer
179views Cryptology» more  CHES 2006»
15 years 8 months ago
Offline Hardware/Software Authentication for Reconfigurable Platforms
Abstract. Many Field-Programmable Gate Array (FPGA) based systems utilize third-party intellectual property (IP) in their development. When they are deployed in non-networked envir...
Eric Simpson, Patrick Schaumont
169
Voted
ECML
2004
Springer
15 years 8 months ago
Efficient Hyperkernel Learning Using Second-Order Cone Programming
The kernel function plays a central role in kernel methods. Most existing methods can only adapt the kernel parameters or the kernel matrix based on empirical data. Recently, Ong e...
Ivor W. Tsang, James T. Kwok
« Prev « First page 3551 / 4040 Last » Next »