Sciweavers

233 search results - page 28 / 47
» Implementing Signatures for Transactional Memory
Sort
View
GLOBECOM
2007
IEEE
15 years 3 months ago
A 10-Gbps High-Speed Single-Chip Network Intrusion Detection and Prevention System
Abstract—Network Intrusion Detection and Prevention Systems (NIDPSs) are vital in the fight against network intrusions. NIDPSs search for certain malicious content in network tr...
N. Sertac Artan, Rajdip Ghosh, Yanchuan Guo, H. Jo...
SIGPLAN
2008
14 years 9 months ago
Single global lock semantics in a weakly atomic STM
As memory transactions have been proposed as a language-level replacement for locks, there is growing need for well-defined semantics. In contrast to database transactions, transa...
Vijay Menon, Steven Balensiefer, Tatiana Shpeisman...
ICCV
2009
IEEE
16 years 2 months ago
Compact Signatures for High-Speed Interest Point Description and Matching
Prominent feature point descriptors such as SIFT and SURF allow reliable real-time matching but at a compu- tational cost that limits the number of points that can be handled on...
Michael Calonder, Vincent Lepetit, Pascal Fua, Kur...
IJSN
2007
106views more  IJSN 2007»
14 years 9 months ago
Hash-AV: fast virus signature scanning by cache-resident filters
Abstract— Fast virus scanning is becoming increasingly important in today’s Internet. While Moore’s law continues to double CPU cycle speed, virus scanning applications fail ...
Ozgun Erdogan, Pei Cao
IPPS
2010
IEEE
14 years 7 months ago
Consistency in hindsight: A fully decentralized STM algorithm
Abstract--Software transactional memory (STM) algorithms often rely on centralized components to achieve atomicity, isolation and consistency. In a distributed setting, centralized...
Annette Bieniusa, Thomas Fuhrmann