Sciweavers

839 search results - page 135 / 168
» Data Mining for Intrusion Detection: Techniques, Application...
Sort
View
111
Voted
ISPASS
2007
IEEE
15 years 7 months ago
Simplifying Active Memory Clusters by Leveraging Directory Protocol Threads
Address re-mapping techniques in so-called active memory systems have been shown to dramatically increase the performance of applications with poor cache and/or communication beha...
Dhiraj D. Kalamkar, Mainak Chaudhuri, Mark Heinric...
96
Voted
EUROSYS
2009
ACM
15 years 10 months ago
Pointless tainting?: evaluating the practicality of pointer tainting
This paper evaluates pointer tainting, an incarnation of Dynamic Information Flow Tracking (DIFT), which has recently become an important technique in system security. Pointer tai...
Asia Slowinska, Herbert Bos
135
Voted
HPDC
2008
IEEE
15 years 7 months ago
StoreGPU: exploiting graphics processing units to accelerate distributed storage systems
Today Graphics Processing Units (GPUs) are a largely underexploited resource on existing desktops and a possible costeffective enhancement to high-performance systems. To date, mo...
Samer Al-Kiswany, Abdullah Gharaibeh, Elizeu Santo...
129
Voted
KDD
2010
ACM
272views Data Mining» more  KDD 2010»
14 years 11 months ago
Scalable similarity search with optimized kernel hashing
Scalable similarity search is the core of many large scale learning or data mining applications. Recently, many research results demonstrate that one promising approach is creatin...
Junfeng He, Wei Liu, Shih-Fu Chang
93
Voted
HCI
2009
14 years 10 months ago
Developing, Deploying and Assessing Usage of a Movie Archive System among Students of Film Studies
This paper describes our work in developing a movie browser application for students of Film Studies at our University. The aim of our work is to address the issues that arise when...
Nazlena Mohamad Ali, Alan F. Smeaton, Hyowon Lee, ...