Sciweavers

5247 search results - page 326 / 1050
» Frequency Optimized Computation Methods
Sort
View
CONEXT
2007
ACM
15 years 5 months ago
Detecting worm variants using machine learning
Network intrusion detection systems typically detect worms by examining packet or flow logs for known signatures. Not only does this approach mean worms cannot be detected until ...
Oliver Sharma, Mark Girolami, Joseph S. Sventek
CG
2007
Springer
15 years 3 months ago
Subdivision surface watermarking
This paper presents a robust non-blind watermarking scheme for subdivision surfaces. The algorithm works in the frequency domain, by modulating spectral coefficients of the subdi...
Guillaume Lavoué, Florence Denis, Florent D...
DAC
2011
ACM
14 years 3 months ago
Generalized reliability-oriented energy management for real-time embedded applications
DVFS remains an important energy management technique for embedded systems. However, its negative impact on transient fault rates has been recently shown. In this paper, we propos...
Baoxian Zhao, Hakan Aydin, Dakai Zhu
DATE
2002
IEEE
84views Hardware» more  DATE 2002»
15 years 8 months ago
Highly Scalable Dynamically Reconfigurable Systolic Ring-Architecture for DSP Applications
Microprocessors are today getting more and more inefficient for a growing range of applications. Its principles -The Von Neumann paradigm[3]- based on the sequential execution of ...
Gilles Sassatelli, Lionel Torres, Pascal Benoit, T...
144
Voted
ICDM
2006
IEEE
183views Data Mining» more  ICDM 2006»
15 years 9 months ago
Accelerating Newton Optimization for Log-Linear Models through Feature Redundancy
— Log-linear models are widely used for labeling feature vectors and graphical models, typically to estimate robust conditional distributions in presence of a large number of pot...
Arpit Mathur, Soumen Chakrabarti