Sciweavers

1427 search results - page 139 / 286
» Kernels for Semi-Structured Data
Sort
View
140
Voted
SP
1999
IEEE
194views Security Privacy» more  SP 1999»
15 years 5 months ago
Detecting Intrusions using System Calls: Alternative Data Models
Intrusion detection systems rely on a wide variety of observable data to distinguish between legitimate and illegitimate activities. In this paper we study one such observable-seq...
Christina Warrender, Stephanie Forrest, Barak A. P...
ISSS
1996
IEEE
123views Hardware» more  ISSS 1996»
15 years 5 months ago
Memory Organization for Improved Data Cache Performance in Embedded Processors
Code generation for embedded processors creates opportunities for several performance optimizations not applicable for traditional compilers. We present techniques for improving d...
Preeti Ranjan Panda, Nikil D. Dutt, Alexandru Nico...
198
Voted
LCPC
2005
Springer
15 years 6 months ago
Applying Data Copy to Improve Memory Performance of General Array Computations
Abstract. Data copy is an important compiler optimization which dynamically rearranges the layout of arrays by copying their elements into local buffers. Traditionally, array copy...
Qing Yi
102
Voted
ESANN
2004
15 years 2 months ago
Neural methods for non-standard data
Standard pattern recognition provides effective and noise-tolerant tools for machine learning tasks; however, most approaches only deal with real vectors of a finite and fixed dime...
Barbara Hammer, Brijnesh J. Jain
147
Voted
CIDR
2011
221views Algorithms» more  CIDR 2011»
14 years 4 months ago
Deuteronomy: Transaction Support for Cloud Data
The Deuteronomy system supports efficient and scalable ACID transactions in the cloud by decomposing functions of a database storage engine kernel into: (a) a transactional compon...
Justin J. Levandoski, David B. Lomet, Mohamed F. M...