Sciweavers

2609 search results - page 502 / 522
» Optimizing for parallelism and data locality
Sort
View
ASPLOS
2006
ACM
15 years 1 months ago
Comprehensively and efficiently protecting the heap
The goal of this paper is to propose a scheme that provides comprehensive security protection for the heap. Heap vulnerabilities are increasingly being exploited for attacks on co...
Mazen Kharbutli, Xiaowei Jiang, Yan Solihin, Guru ...
EMSOFT
2008
Springer
14 years 11 months ago
Workload-based configuration of MEMS-based storage devices for mobile systems
Because of its small form factor, high capacity, and expected low cost, MEMS-based storage is a suitable storage technology for mobile systems. However, flash memory may outperfor...
Mohammed G. Khatib, Ethan L. Miller, Pieter H. Har...
BMCBI
2010
65views more  BMCBI 2010»
14 years 10 months ago
VIPR: A probabilistic algorithm for analysis of microbial detection microarrays
Background: All infectious disease oriented clinical diagnostic assays in use today focus on detecting the presence of a single, well defined target agent or a set of agents. In r...
Adam F. Allred, Guang Wu, Tuya Wulan, Kael F. Fisc...
FSS
2010
147views more  FSS 2010»
14 years 8 months ago
A divide and conquer method for learning large Fuzzy Cognitive Maps
Fuzzy Cognitive Maps (FCMs) are a convenient tool for modeling and simulating dynamic systems. FCMs were applied in a large number of diverse areas and have already gained momentu...
Wojciech Stach, Lukasz A. Kurgan, Witold Pedrycz
CCS
2011
ACM
13 years 10 months ago
MIDeA: a multi-parallel intrusion detection architecture
Network intrusion detection systems are faced with the challenge of identifying diverse attacks, in extremely high speed networks. For this reason, they must operate at multi-Giga...
Giorgos Vasiliadis, Michalis Polychronakis, Sotiri...