Sciweavers

2779 search results - page 176 / 556
» Modelling Immunological Memory
Sort
View
117
Voted
ESANN
2004
15 years 5 months ago
Computational model of amygdala network supported by neurobiological data
Abstract. The amygdala has repeatedly been involved in the processing of emotional reactions and conditioning. This paper presents a neurobiologically inspired computational model ...
Mélanie Falgairolle, Agnès Gorge, Je...
131
Voted
INFOCOM
2012
IEEE
13 years 6 months ago
FlowSifter: A counting automata approach to layer 7 field extraction for deep flow inspection
Abstract—In this paper, we introduce FlowSifter, a systematic framework for online application protocol field extraction. FlowSifter introduces a new grammar model Counting Regu...
Chad R. Meiners, Eric Norige, Alex X. Liu, Eric To...
137
Voted
EMSOFT
2007
Springer
15 years 9 months ago
Exploiting non-volatile RAM to enhance flash file system performance
Non-volatile RAM (NVRAM) such as PRAM (Phase-change RAM), FeRAM (Ferroelectric RAM), and MRAM (Magnetoresistive RAM) has characteristics of both non-volatile storage and random ac...
In Hwan Doh, Jongmoo Choi, Donghee Lee, Sam H. Noh
ASPLOS
2011
ACM
14 years 7 months ago
RCDC: a relaxed consistency deterministic computer
Providing deterministic execution significantly simplifies the debugging, testing, replication, and deployment of multithreaded programs. Recent work has developed deterministic...
Joseph Devietti, Jacob Nelson, Tom Bergan, Luis Ce...
115
Voted
IWIA
2005
IEEE
15 years 9 months ago
A Methodology for Designing Countermeasures against Current and Future Code Injection Attacks
This paper proposes a methodology to develop countermeasures against code injection attacks, and validates the methodology by working out a specific countermeasure. This methodol...
Yves Younan, Wouter Joosen, Frank Piessens