Sciweavers

2853 search results - page 347 / 571
» On Coherence in Computer Algebra
Sort
View
RAID
1999
Springer
15 years 8 months ago
Anomaly Intrusion Detection Systems: Handling Temporal Relations Between Events
Lately, many approaches have been developed to discover computer abuse. Some of them use data mining techniques to discover anomalous behavior in audit trail, considering this beh...
Alexandr Seleznyov, Seppo Puuronen
IPPS
1998
IEEE
15 years 8 months ago
The Implicit Pipeline Method
We present a novel scheme for the solution of linear differential equation systems on parallel computers. The Implicit Pipeline (ImP) method uses an implicit timeintegration schem...
John B. Pormann
ARITH
1993
IEEE
15 years 8 months ago
Faster numerical algorithms via exception handling
An attractive paradigm for building fast numerical algorithms is the following: 1 try a fast but occasionally unstable algorithm, 2 test the accuracy of the computed answer, a...
James Demmel, Xiaoye S. Li
EURODAC
1994
IEEE
122views VHDL» more  EURODAC 1994»
15 years 8 months ago
Compiled-code-based simulation with timing verification
Due to the complexity of today's systems, prototyping by simulation must be based on simulation-engine-like performance. It is proved by implementations that compiler-driven ...
Winfried Hahn, Andreas Hagerer, C. Herrmann
CGI
2004
IEEE
15 years 8 months ago
Efficient Hardware for Antialiasing Coverage Mask Generation
An efficient low-cost, low-power hardware implementation of a novel run-time pixel coverage mask generation algorithm for embedded 3-D graphics antialiasing purposes is presented....
Dan Crisu, Sorin Cotofana, Stamatis Vassiliadis, P...