Sciweavers

1862 search results - page 169 / 373
» Constrained pattern matching
Sort
View
EUC
2007
Springer
15 years 7 months ago
Parallel Network Intrusion Detection on Reconfigurable Platforms
With the wide adoption of internet into our everyday lives, internet security becomes an important issue. Intrusion detection at the network level is an effective way of stopping m...
Chun Xue, Zili Shao, Meilin Liu, Qingfeng Zhuge, E...
CLUSTER
2001
IEEE
15 years 6 months ago
Clusterfile: A Flexible Physical Layout Parallel File System
This paper presents Clusterfile, a parallel file system that provides parallel file access on a cluster of computers. Existing parallel file systems offer little control over matc...
Florin Isaila, Walter F. Tichy
JFP
2006
90views more  JFP 2006»
15 years 3 months ago
Regular expression filters for XML
XML data are described by types involving regular expressions. This raises the question of what language feature is convenient for manipulating such data. Previously, we have give...
Haruo Hosaya
CHES
2007
Springer
115views Cryptology» more  CHES 2007»
15 years 9 months ago
Highly Regular Right-to-Left Algorithms for Scalar Multiplication
This papers introduces several binary scalar multiplication algorithms with applications to cryptography. Remarkably, the proposed algorithms regularly repeat the same pattern when...
Marc Joye
ICMCS
2000
IEEE
135views Multimedia» more  ICMCS 2000»
15 years 7 months ago
Tracking of Multiple Faces for Human-Computer Interfaces and Virtual Environments
In this paper, we describe a real-time face-tracking algorithm. We start with single face tracking based on statistical color modeling and the deformable template. We then expand ...
Fu Jie Huang, Tsuhan Chen