Sciweavers

21324 search results - page 3826 / 4265
» Making the case for computing
Sort
View
CN
2007
168views more  CN 2007»
15 years 4 months ago
Network anomaly detection with incomplete audit data
With the ever increasing deployment and usage of gigabit networks, traditional network anomaly detection based Intrusion Detection Systems (IDS) have not scaled accordingly. Most,...
Animesh Patcha, Jung-Min Park
ISCA
2008
IEEE
201views Hardware» more  ISCA 2008»
15 years 4 months ago
iDEAL: Inter-router Dual-Function Energy and Area-Efficient Links for Network-on-Chip (NoC) Architectures
Network-on-Chip (NoC) architectures have been adopted by a growing number of multi-core designs as a flexible and scalable solution to the increasing wire delay constraints in the...
Avinash Karanth Kodi, Ashwini Sarathy, Ahmed Louri
CORR
2007
Springer
100views Education» more  CORR 2007»
15 years 4 months ago
Interference Automata
We propose a computing model, the Two-Way Optical Interference Automata (2OIA), that makes use of the phenomenon of optical interference. We introduce this model to investigate th...
M. V. Panduranga Rao
JNSM
2008
130views more  JNSM 2008»
15 years 4 months ago
Declarative Infrastructure Configuration Synthesis and Debugging
There is a large conceptual gap between end-to-end infrastructure requirements and detailed component configuration implementing those requirements. Today, this gap is manually br...
Sanjai Narain, Gary Levin, Sharad Malik, Vikram Ka...
CVIU
2007
137views more  CVIU 2007»
15 years 4 months ago
Visual learning of texture descriptors for facial expression recognition in thermal imagery
Facial expression recognition is an active research area that finds a potential application in human emotion analysis. This work presents an illumination independent approach for...
Benjamín Hernández, Gustavo Olague, ...
« Prev « First page 3826 / 4265 Last » Next »