Sciweavers

4763 search results - page 151 / 953
» On the Execution of Deep Models
Sort
View
NOMS
2010
IEEE
163views Communications» more  NOMS 2010»
14 years 10 months ago
DReaM-Cache: Distributed Real-Time Transaction Memory Cache to support two-factor authentication services and its reliability
—PhoneFactor is a two-factor authentication service that combines the knowledge-based authenticator with an objectbased authenticator in which the object-based authenticator has ...
Haiyang Qian, Chandra Sekhar Surapaneni, Marsh Ray...
ANCS
2009
ACM
14 years 9 months ago
A NFA-based programmable regular expression match engine
Pattern matching is the most computation intensive task of a network intrusion detection system (NIDS). In this paper we present a hardware architecture to speed up the pattern mat...
Derek Pao
ACL
2011
14 years 3 months ago
Language of Vandalism: Improving Wikipedia Vandalism Detection via Stylometric Analysis
Community-based knowledge forums, such as Wikipedia, are susceptible to vandalism, i.e., ill-intentioned contributions that are detrimental to the quality of collective intelligen...
Manoj Harpalani, Michael Hart, Sandesh Signh, Rob ...
SAMOS
2009
Springer
15 years 6 months ago
Realizing FIFO Communication When Mapping Kahn Process Networks onto the Cell
Kahn Process Networks (KPN) are an appealing model of computation to specify streaming applications. When a KPN has to execute on a multi-processor platform, a mapping of the KPN m...
Dmitry Nadezhkin, Sjoerd Meijer, Todor Stefanov, E...
ICCS
2007
Springer
15 years 3 months ago
Towards a Formal Foundation for Aggregating Scientific Workflows
In e-Science, scientific workflow systems are used to share data and knowledge in collaborative experiments. In recent work we discussed the concepts of a workflow bus [1], allowin...
Frank Terpstra, Zhiming Zhao, Wico Mulder, Pieter ...