Sciweavers

3785 search results - page 203 / 757
» Immune System Based Intrusion Detection System
Sort
View
USENIX
2008
15 years 7 months ago
Context-Aware Prefetching at the Storage Server
In many of today's applications, access to storage constitutes the major cost of processing a user request. Data prefetching has been used to alleviate the storage access lat...
Gokul Soundararajan, Madalin Mihailescu, Cristiana...
ISPASS
2009
IEEE
15 years 12 months ago
Evaluating GPUs for network packet signature matching
Modern network devices employ deep packet inspection to enable sophisticated services such as intrusion detection, traffic shaping, and load balancing. At the heart of such servi...
Randy Smith, Neelam Goyal, Justin Ormont, Karthike...
IPPS
2009
IEEE
15 years 11 months ago
Input-independent, scalable and fast string matching on the Cray XMT
String searching is at the core of many security and network applications like search engines, intrusion detection systems, virus scanners and spam filters. The growing size of o...
Oreste Villa, Daniel G. Chavarría-Miranda, ...
ENGL
2007
100views more  ENGL 2007»
15 years 5 months ago
Skew Estimation Technique for Binary Document Images based on Thinning and Moments
-When a document is fed to a scanner either mechanically or by a human operator for digitization, it suffers from some degrees of skew or tilt. Skew angle detection is an important...
Aradhya V. N. Manjunath, G. Hemantha Kumar, P. Shi...
162
Voted
CODES
2010
IEEE
15 years 1 months ago
Hardware/software optimization of error detection implementation for real-time embedded systems
This paper presents an approach to system-level optimization of error detection implementation in the context of fault-tolerant realtime distributed embedded systems used for safe...
Adrian Lifa, Petru Eles, Zebo Peng, Viacheslav Izo...