Sciweavers

8177 search results - page 1520 / 1636
» Detecting System Emulators
Sort
View
126
Voted
ISPASS
2009
IEEE
15 years 10 months ago
Evaluating GPUs for network packet signature matching
Modern network devices employ deep packet inspection to enable sophisticated services such as intrusion detection, traffic shaping, and load balancing. At the heart of such servi...
Randy Smith, Neelam Goyal, Justin Ormont, Karthike...
EDBT
2009
ACM
136views Database» more  EDBT 2009»
15 years 10 months ago
Rule-based multi-query optimization
Data stream management systems usually have to process many long-running queries that are active at the same time. Multiple queries can be evaluated more efficiently together tha...
Mingsheng Hong, Mirek Riedewald, Christoph Koch, J...
CODES
2009
IEEE
15 years 10 months ago
FRA: a flash-aware redundancy array of flash storage devices
Since flash memory has many attractive characteristics such as high performance, non-volatility, low power consumption and shock resistance, it has been widely used as storage med...
Yangsup Lee, Sanghyuk Jung, Yong Ho Song
148
Voted
IPPS
2009
IEEE
15 years 10 months ago
Input-independent, scalable and fast string matching on the Cray XMT
String searching is at the core of many security and network applications like search engines, intrusion detection systems, virus scanners and spam filters. The growing size of o...
Oreste Villa, Daniel G. Chavarría-Miranda, ...
IROS
2009
IEEE
208views Robotics» more  IROS 2009»
15 years 10 months ago
Calibrating an outdoor distributed camera network using Laser Range Finder data
Abstract— Outdoor camera networks are becoming ubiquitous in critical urban areas of large cities around the world. Although current applications of camera networks are mostly li...
Agustin Alberto Ortega Jimenez, Bruno Dias, Ernest...
« Prev « First page 1520 / 1636 Last » Next »