Sciweavers

741 search results - page 63 / 149
» Memory Dependence Prediction Using Store Sets
Sort
View
AINA
2006
IEEE
15 years 8 months ago
Efficient Packet Matching for Gigabit Network Intrusion Detection using TCAMs
Ternary content-addressable memories (TCAMs) have gained wide acceptance in the industry for storing and searching patterns in routers. But two important problems block the way to...
Ming Gao, Kenong Zhang, Jiahua Lu
CGO
2008
IEEE
15 years 8 months ago
Spice: speculative parallel iteration chunk execution
The recent trend in the processor industry of packing multiple processor cores in a chip has increased the importance of automatic techniques for extracting thread level paralleli...
Easwaran Raman, Neil Vachharajani, Ram Rangan, Dav...
DAWAK
2006
Springer
15 years 3 months ago
COBRA: Closed Sequential Pattern Mining Using Bi-phase Reduction Approach
Sequential pattern mining aims to find frequent patterns (guarded by a minimum support) in a database of sequences. As the support decreases the number of sequential patterns will...
Kuo-Yu Huang, Chia-Hui Chang, Jiun-Hung Tung, Chen...
VISUAL
2005
Springer
15 years 7 months ago
Unsupervised Color Film Restoration Using Adaptive Color Equalization
Chemical processing of celluloid based cinematic film, becomes unstable with time, unless they are stored at low temperatures. Some defects, such as bleaching on color movies, are ...
Alessandro Rizzi, Carlo Gatta, C. Slanzi, Gianluig...
ESAS
2005
Springer
15 years 7 months ago
Remote Software-Based Attestation for Wireless Sensors
Wireless sensor networks are envisioned to be deployed in mission-critical applications. Detecting a compromised sensor, whose memory contents have been tampered, is crucial in the...
Mark Shaneck, Karthikeyan Mahadevan, Vishal Kher, ...