Sciweavers

8177 search results - page 370 / 1636
» Detecting System Emulators
Sort
View
136
Voted
AINA
2006
IEEE
15 years 9 months ago
Efficient Packet Matching for Gigabit Network Intrusion Detection using TCAMs
Ternary content-addressable memories (TCAMs) have gained wide acceptance in the industry for storing and searching patterns in routers. But two important problems block the way to...
Ming Gao, Kenong Zhang, Jiahua Lu
115
Voted
ICDM
2003
IEEE
184views Data Mining» more  ICDM 2003»
15 years 9 months ago
Detecting Patterns of Change Using Enhanced Parallel Coordinates Visualization
Analyzing data to find trends, correlations, and stable patterns is an important problem for many industrial applications. In this paper, we propose a new technique based on paral...
Kaidi Zhao, Bing Liu, Thomas M. Tirpak, Andreas Sc...
WCRE
2003
IEEE
15 years 9 months ago
Detecting Merging and Splitting using Origin Analysis
Merging and splitting source code artifacts is a common activity during the lifespan of a software system; as developers rethink the essential structure of a system or plan for a ...
Lijie Zou, Michael W. Godfrey
152
Voted
CASES
2003
ACM
15 years 9 months ago
Frequent loop detection using efficient non-intrusive on-chip hardware
Dynamic software optimization methods are becoming increasingly popular for improving software performance and power. The first step in dynamic optimization consists of detecting ...
Ann Gordon-Ross, Frank Vahid
SIGMETRICS
2010
ACM
160views Hardware» more  SIGMETRICS 2010»
15 years 8 months ago
RSIO: automatic user interaction detection and scheduling
We present RSIO, a processor scheduling framework for improving the response time of latency-sensitive applications by monitoring accesses to I/O channels and inferring when user ...
Haoqiang Zheng, Jason Nieh