Sciweavers

667 search results - page 127 / 134
» Dynamic hardware software partitioning: a first approach
Sort
View
CCS
2009
ACM
15 years 4 months ago
Countering kernel rootkits with lightweight hook protection
Kernel rootkits have posed serious security threats due to their stealthy manner. To hide their presence and activities, many rootkits hijack control flows by modifying control d...
Zhi Wang, Xuxian Jiang, Weidong Cui, Peng Ning
BIBE
2008
IEEE
142views Bioinformatics» more  BIBE 2008»
15 years 3 months ago
Optimizing performance, cost, and sensitivity in pairwise sequence search on a cluster of PlayStations
— The Smith-Waterman algorithm is a dynamic programming method for determining optimal local alignments between nucleotide or protein sequences. However, it suffers from quadrati...
Ashwin M. Aji, Wu-chun Feng
CVPR
2004
IEEE
15 years 11 months ago
Programmable Imaging Using a Digital Micromirror Array
In this paper, we introduce the notion of a programmable imaging system. Such an imaging system provides a human user or a vision system significant control over the radiometric a...
Shree K. Nayar, Vlad Branzoi, Terrance E. Boult
91
Voted
SIGMOD
2001
ACM
134views Database» more  SIGMOD 2001»
15 years 9 months ago
Preservation of Digital Data with Self-Validating, Self-Instantiating Knowledge-Based Archives
Digital archives are dedicated to the long-term preservation of electronic information and have the mandate to enable sustained access despite rapid technology changes. Persistent...
Bertram Ludäscher, Richard Marciano, Reagan Moore
MSS
2005
IEEE
84views Hardware» more  MSS 2005»
15 years 3 months ago
Storage-Based Intrusion Detection for Storage Area Networks (SANs)
Storage systems are the next frontier for providing protection against intrusion. Since storage systems see changes to persistent data, several types of intrusions can be detected...
Mohammad Banikazemi, Dan E. Poff, Bülent Abal...