Sciweavers

884 search results - page 128 / 177
» Implementation of the MLP Kernel
Sort
View
CIKM
2009
Springer
15 years 11 months ago
Towards non-directional Xpath evaluation in a RDBMS
XML query languages use directional path expressions to locate data in an XML data collection. They are tightly coupled to the structure of a data collection, and can fail when ev...
Sourav S. Bhowmick, Curtis E. Dyreson, Erwin Leona...
JTRES
2009
ACM
15 years 11 months ago
Avoiding unbounded priority inversion in barrier protocols using gang priority management
Large real-time software systems such as real-time Java virtual machines often use barrier protocols, which work for a dynamically varying number of threads without using centrali...
Harald Röck, Joshua S. Auerbach, Christoph M....
SMA
2009
ACM
137views Solid Modeling» more  SMA 2009»
15 years 11 months ago
Hierarchical molecular interfaces and solvation electrostatics
Electrostatic interactions play a significant role in determining the binding affinity of molecules and drugs. While significant effort has been devoted to the accurate computat...
Chandrajit L. Bajaj, Shun-Chuan Albert Chen, Guoli...
AINA
2008
IEEE
15 years 11 months ago
Annulling SYN Flooding Attacks with Whitelist
SYN flooding is one of classical Denial of Service (DoS) attacks abusing the TCP 3-way handshake process. This attack causes a server not to accept additional connection requests...
Tae Hyung Kim, Young-Sik Choi, Jong Kim, Sung Je H...
ASAP
2008
IEEE
118views Hardware» more  ASAP 2008»
15 years 11 months ago
Bit matrix multiplication in commodity processors
Registers in processors generally contain words or, with the addition of multimedia extensions, short vectors of subwords of bytes or 16-bit elements. In this paper, we view the c...
Yedidya Hilewitz, Cédric Lauradoux, Ruby B....