Sciweavers

3819 search results - page 345 / 764
» Predicting Dependability by Testing
Sort
View
DIMVA
2010
15 years 3 months ago
KIDS - Keyed Intrusion Detection System
Since most current network attacks happen at the application layer, analysis of packet payload is necessary for their detection. Unfortunately malicious packets may be crafted to m...
Sasa Mrdovic, Branislava Drazenovic
MMAS
2010
Springer
14 years 11 months ago
Clustering and Classification through Normalizing Flows in Feature Space
A unified variational methodology is developed for classification and clustering problems, and tested in the classification of tumors from gene expression data. It is based on flu...
J. P. Agnelli, M. Cadeiras, E. G. Tabak, C. V. Tur...
IPPS
2006
IEEE
15 years 11 months ago
Dynamic multi phase scheduling for heterogeneous clusters
Distributed computing systems are a viable and less expensive alternative to parallel computers. However, concurrent programming methods in distributed systems have not been studi...
Florina M. Ciorba, Theodore Andronikos, Ioannis Ri...
CGO
2003
IEEE
15 years 10 months ago
Optimizing Memory Accesses For Spatial Computation
In this paper we present the internal representation and optimizations used by the CASH compiler for improving the memory parallelism of pointer-based programs. CASH uses an SSA-b...
Mihai Budiu, Seth Copen Goldstein
175
Voted
AI
2008
Springer
15 years 5 months ago
Speculative plan execution for information gathering
The execution performance of an information gathering plan can suffer significantly due to remote I/O latencies. A streaming dataflow model of execution addresses the problem to s...
Greg Barish, Craig A. Knoblock