Sciweavers

2681 search results - page 385 / 537
» Performance results of running parallel applications on the ...
Sort
View
FPL
2005
Springer
137views Hardware» more  FPL 2005»
15 years 3 months ago
Bitwise Optimised CAM for Network Intrusion Detection Systems
String pattern matching is a computationally expensive task, and when implemented in hardware, it can consume a large amount of resources for processing and storage. This paper pr...
Sherif Yusuf, Wayne Luk
HPCC
2005
Springer
15 years 3 months ago
Efficient SIMD Numerical Interpolation
This paper reports the results of SIMD implementation of a number of interpolation algorithms on common personal computers. These methods fit a curve on some given input points for...
Hossein Ahmadi, Maryam Moslemi Naeini, Hamid Sarba...
ISCA
1999
IEEE
98views Hardware» more  ISCA 1999»
15 years 2 months ago
Multicast Snooping: A New Coherence Method Using a Multicast Address Network
This paper proposes a new coherence method called "multicast snooping" that dynamically adapts between broadcast snooping and a directory protocol. Multicast snooping is...
E. Ender Bilir, Ross M. Dickson, Ying Hu, Manoj Pl...
AUSFORENSICS
2004
14 years 11 months ago
An Analysis and Comparison of Clustered Password Crackers
Password policies alone do not stand a chance of securing computer systems which rely on the use of secretbased, password authentication methods. The enforcement of "strong&q...
Christian Frichot
JBCB
2006
60views more  JBCB 2006»
14 years 10 months ago
Efficient Algorithms and Software for Detection of Full-length Ltr Retrotransposons
LTR retrotransposons constitute one of the most abundant classes of repetitive elements in eukaryotic genomes. In this paper, we present a new algorithm for detection of full-leng...
Anantharaman Kalyanaraman, Srinivas Aluru