Sciweavers

204 search results - page 16 / 41
» Fast Set Operations Using Treaps
Sort
View
DAC
1998
ACM
15 years 4 months ago
Arithmetic Optimization Using Carry-Save-Adders
Carry-save-adderCSA is the most often used type of operation in implementing a fast computation of arithmetics of register-transfer level design in industry. This paper establis...
Taewhan Kim, William Jao, Steven W. K. Tjiang
75
Voted
FLAIRS
1998
15 years 1 months ago
Detecting Motion in Single Images Using ALISA
Motionanalysis often relies on differencing operations that inherently amplify noise and are hindered by the spatial correspondenceproblem.Analternative approach is proposedusing ...
Taras P. Riopka, Peter Bock
72
Voted
GECCO
2008
Springer
127views Optimization» more  GECCO 2008»
15 years 24 days ago
Denial of service detection and analysis using idiotypic networks paradigm
In this paper we present a novel intrusion detection architecture based on Idiotypic Network Theory (INIDS), that aims at dealing with large scale network attacks featuring variab...
Marek Ostaszewski, Pascal Bouvry, Franciszek Sered...
CIKM
1998
Springer
15 years 4 months ago
Supporting Fast Search in Time Series for Movement Patterns in Multiple Scales
An important investigation of time series involves searching for \movement" patterns, such as \going up" or \going down" or some combinations of them. Movement patt...
Yunyao Qu, Changzhou Wang, Xiaoyang Sean Wang
ANCS
2006
ACM
15 years 5 months ago
CAMP: fast and efficient IP lookup architecture
A large body of research literature has focused on improving the performance of longest prefix match IP-lookup. More recently, embedded memory based architectures have been propos...
Sailesh Kumar, Michela Becchi, Patrick Crowley, Jo...