Sciweavers

773 search results - page 51 / 155
» Kernel Change-point Analysis
Sort
View
118
Voted
CCS
2009
ACM
15 years 10 months ago
Robust signatures for kernel data structures
Kernel-mode rootkits hide objects such as processes and threads using a technique known as Direct Kernel Object Manipulation (DKOM). Many forensic analysis tools attempt to detect...
Brendan Dolan-Gavitt, Abhinav Srivastava, Patrick ...
146
Voted
HIPC
2005
Springer
15 years 9 months ago
Design and Implementation of the HPCS Graph Analysis Benchmark on Symmetric Multiprocessors
Graph theoretic problems are representative of fundamental computations in traditional and emerging scientific disciplines like scientific computing, computational biology and b...
David A. Bader, Kamesh Madduri
139
Voted
IMC
2010
ACM
15 years 1 months ago
High speed network traffic analysis with commodity multi-core systems
Multi-core systems are the current dominant trend in computer processors. However, kernel network layers often do not fully exploit multi-core architectures. This is due to issues...
Francesco Fusco, Luca Deri
130
Voted
ICA
2007
Springer
15 years 9 months ago
On Separation of Signal Sources Using Kernel Estimates of Probability Densities
The discussion in this paper revolves around the notion of separation problems. The latter can be thought of as a unifying concept which includes a variety of important problems in...
Oleg V. Michailovich, Douglas Wiens
137
Voted
NIPS
2001
15 years 5 months ago
Discriminative Direction for Kernel Classifiers
In many scientific and engineering applications, detecting and understanding differences between two groups of examples can be reduced to a classical problem of training a classif...
Polina Golland