Sciweavers

3785 search results - page 641 / 757
» Immune System Based Intrusion Detection System
Sort
View
144
Voted
IPPS
2002
IEEE
15 years 9 months ago
Compiler-Directed I/O Optimization
Despite continued innovations in design of I/O systems, I/O performance has not kept pace with the progress in processor and communication technology. This paper addresses this I/...
Mahmut T. Kandemir, Alok N. Choudhary
SIGCOMM
2000
ACM
15 years 9 months ago
Endpoint admission control: Architectural issues and performance
The traditional approach to implementing admission control, as exemplified by the Integrated Services proposal in the IETF, uses a signalling protocol to establish reservations a...
Lee Breslau, Edward W. Knightly, Scott Shenker, Io...
BMCV
2000
Springer
15 years 9 months ago
Towards a Computational Model for Object Recognition in IT Cortex
First IEEE International Workshop on Biologically Motivated Computer Vision, Seoul, Korea (May 2000). There is considerable evidence that object recognition in primates is based o...
David G. Lowe
VVS
1996
IEEE
205views Visualization» more  VVS 1996»
15 years 8 months ago
3D Shock Wave Visualization on Unstructured Grids
A critical issue in understanding high speed flows is the study of shock waves. This paper summarizes our research on techniques for the detection and visualization of shock waves...
Kwan-Liu Ma, John Van Rosendale, Willem Vermeer
136
Voted
CTRSA
2006
Springer
160views Cryptology» more  CTRSA 2006»
15 years 8 months ago
RFID-Tags for Anti-counterfeiting
RFID-tags are becoming very popular tools for identification of products. As they have a small microchip on board, they offer functionality that can be used for security purposes. ...
Pim Tuyls, Lejla Batina