Sciweavers

6607 search results - page 1192 / 1322
» Making TeX Work
Sort
View
ACSAC
2004
IEEE
15 years 6 months ago
RACOON: Rapidly Generating User Command Data For Anomaly Detection From Customizable Templates
One of the biggest obstacles faced by user command based anomaly detection techniques is the paucity of data. Gathering command data is a slow process often spanning months or yea...
Ramkumar Chinchani, Aarthie Muthukrishnan, Madhusu...
ACMSE
2006
ACM
15 years 6 months ago
Achieving efficient polynomial multiplication in fermat fields using the fast Fourier transform
We introduce an efficient way of performing polynomial multiplication in a class of finite fields GF(pm ) in the frequency domain. The Fast Fourier Transform (FFT) based frequency...
Selçuk Baktir, Berk Sunar
APCHI
2004
IEEE
15 years 6 months ago
Understanding Interaction Experience in Mobile Learning
The convergence of mobile technology and e-learning has generated considerable excitement among both practitioners and academics. Mass media continually promotes novel idea about m...
Fariza Hanis Abdul Razak
CASES
2004
ACM
15 years 6 months ago
Providing time- and space- efficient procedure calls for asynchronous software thread integration
Asynchronous Software Thread Integration (ASTI) provides fine-grain concurrency in real-time threads by statically scheduling (integrating) code from primary threads into secondar...
Vasanth Asokan, Alexander G. Dean
CF
2004
ACM
15 years 6 months ago
Reducing traffic generated by conflict misses in caches
Off-chip memory accesses are a major source of power consumption in embedded processors. In order to reduce the amount of traffic between the processor and the off-chip memory as ...
Pepijn J. de Langen, Ben H. H. Juurlink
« Prev « First page 1192 / 1322 Last » Next »