Sciweavers

2891 search results - page 124 / 579
» More or Less Elaborate
Sort
View
ICPR
2008
IEEE
15 years 5 months ago
A network intrusion detection method using independent component analysis
An intrusion detection system (IDS) detects illegal manipulations of computer systems. In intrusion detection systems, feature reduction, including feature extraction and feature ...
Dayu Yang, Hairong Qi
IPPS
2008
IEEE
15 years 5 months ago
Energy efficient packet classification hardware accelerator
Packet classification is an important function in a router’s line-card. Although many excellent solutions have been proposed in the past, implementing high speed packet classifi...
Alan Kennedy, Xiaojun Wang, Bin Liu
ISCAS
2008
IEEE
144views Hardware» more  ISCAS 2008»
15 years 5 months ago
A novel VLSI iterative divider architecture for fast quotient generation
—In this paper, a novel VLSI iterative divider architecture for fast quotient generation that is based on radix-2 non-restoring division is proposed. To speed up the quotient gen...
Tso-Bing Juang, Sheng-Hung Chen, Shin-Mao Li
HICSS
2007
IEEE
129views Biometrics» more  HICSS 2007»
15 years 5 months ago
The Impact of Negative Relations on Performance and Satisfaction in Group Work
This paper reports on a case study conducted to guide the design and implementation of a group support system. Network analysis of student self-reported interactions was conducted...
Ling Xia, N. Sadat Shami, Y. Connie Yuan, Geri Gay
IPCCC
2007
IEEE
15 years 5 months ago
Ensuring Performance in Activity-Based File Relocation
Dynamic Storage Tiering (DST) is the concept of grouping storage devices into tiers based on their characteristics, and relocating files dynamically to leverage on the heterogene...
Joel C. Wu, Bo Hong, Scott A. Brandt