Sciweavers

5523 search results - page 362 / 1105
» Improving application performance with hardware data structu...
Sort
View
168
Voted
IEEEIAS
2009
IEEE
15 years 11 months ago
Fuzzy Intrusion Detection System via Data Mining Technique with Sequences of System Calls
: There are two main approaches for implementing IDS; Host based and Network based. While the former is implemented in form of software deployed on a host, the latter, usually is b...
Mohammad Akbarpour Sekeh, Mohd. Aizani Bin Maarof
CIC
2006
140views Communications» more  CIC 2006»
15 years 6 months ago
An Efficient Update Algorithm for Supporting Mobility in Structured P2P Systems
Structured peer to peer (P2P) systems organize a large number of nodes in well-defined structures and provide efficient and scalable search functionalities. They have been used as ...
Boxuan Gu, Hu Wang, Zongming Fei
IVC
2008
129views more  IVC 2008»
15 years 5 months ago
3D Motion from structures of points, lines and planes
In this article we propose a method for estimating the camera motion from a video-sequence acquired in the presence of general 3D structures. Solutions to this problem are commonl...
Andrea Dell'Acqua, Augusto Sarti, Stefano Tubaro
149
Voted
QRE
2010
129views more  QRE 2010»
15 years 3 months ago
Improving quality of prediction in highly dynamic environments using approximate dynamic programming
In many applications, decision making under uncertainty often involves two steps- prediction of a certain quality parameter or indicator of the system under study and the subseque...
Rajesh Ganesan, Poornima Balakrishna, Lance Sherry
151
Voted
ISCA
1999
IEEE
87views Hardware» more  ISCA 1999»
15 years 9 months ago
Memory Forwarding: Enabling Aggressive Layout Optimizations by Guaranteeing the Safety of Data Relocation
By optimizing data layout at run-time, we can potentially enhance the performance of caches by actively creating spatial locality, facilitating prefetching, and avoiding cache con...
Chi-Keung Luk, Todd C. Mowry