Sciweavers

1528 search results - page 89 / 306
» Implementing Generalized Operator Overloading
Sort
View
SIGCOMM
2000
ACM
15 years 9 months ago
Practical network support for IP traceback
This paper describes a technique for tracing anonymous packet flooding attacks in the Internet back towards their source. This work is motivated by the increased frequency and so...
Stefan Savage, David Wetherall, Anna R. Karlin, Th...
ICCD
1999
IEEE
88views Hardware» more  ICCD 1999»
15 years 9 months ago
TriMedia CPU64 Application Development Environment
The architecture of the TriMedia CPU64 is based on the TM1000 DSPCPU. The original VLIW architecture has been extended with the concepts of vector processing and superoperations. ...
Evert-Jan D. Pol, Bas Aarts, Jos T. J. van Eijndho...
CIKM
2001
Springer
15 years 8 months ago
SQL Database Primitives for Decision Tree Classifiers
Scalable data mining in large databases is one of today's challenges to database technologies. Thus, substantial effort is dedicated to a tight coupling of database and data ...
Kai-Uwe Sattler, Oliver Dunemann
EI
1998
47views more  EI 1998»
15 years 6 months ago
One-dimensional Dithering
A real-time inverse dithering system for video display can be implemented very efficiently if operations are needed on only the current scan line. To optimize overall display qual...
Robert Ulichney
FORTE
1997
15 years 6 months ago
On-Line Timed Protocol Trace Analysis Based on Uncertain State Descriptions
This paper presents a new approach to the task of passive protocol tracing. The method called FollowSM for the first time meets all requirements of practical in-field use, inclu...
Marek Musial