Sciweavers

4198 search results - page 758 / 840
» Data Parallel Program Design
Sort
View
NSPW
2004
ACM
15 years 7 months ago
The role of suspicion in model-based intrusion detection
We argue in favor of the explicit inclusion of suspicion as a concrete concept to be used in the analysis of audit data in order to guide the search for evidence of misuse. Our ap...
Timothy Hollebeek, Rand Waltzman
GCC
2004
Springer
15 years 7 months ago
Image-Based Walkthrough over Internet on Mobile Devices
Real-time rendering of complex 3D scene on mobile devices is a challenging task. The main reason is that mobile devices have limited computational capabilities and are lack of powe...
Yu Lei, Zhongding Jiang, Deren Chen, Hujun Bao
LCN
2003
IEEE
15 years 7 months ago
Using a Gigabit Ethernet Cluster as a Distributed Disk Array with Multiple Fault Tolerance
A cluster of PCs can be seen as a collection of networked low cost disks; such a collection can be operated by proper so as to provide the abstraction of a single, larger block de...
Alessandro Di Marco, Giovanni Chiola, Giuseppe Cia...
DELTA
2008
IEEE
15 years 4 months ago
Dynamic Co-operative Intelligent Memory
As semiconductor technology advances, the performance gap between processor and memory has become one of the major issues in computer design. In order to bridge this gap, many met...
Xiaoyong Wen, Faycal Bensaali, Reza Sotudeh
ICMLA
2008
15 years 3 months ago
Highly Scalable SVM Modeling with Random Granulation for Spam Sender Detection
Spam sender detection based on email subject data is a complex large-scale text mining task. The dataset consists of email subject lines and the corresponding IP address of the em...
Yuchun Tang, Yuanchen He, Sven Krasser