Sciweavers

1238 search results - page 196 / 248
» Software Mass Customization
Sort
View
RAID
2009
Springer
15 years 6 months ago
Multi-byte Regular Expression Matching with Speculation
Intrusion prevention systems determine whether incoming traffic matches a database of signatures, where each signature in the database represents an attack or a vulnerability. IPSs...
Daniel Luchaup, Randy Smith, Cristian Estan, Somes...
SBCCI
2009
ACM
188views VLSI» more  SBCCI 2009»
15 years 6 months ago
Low-power inter-core communication through cache partitioning in embedded multiprocessors
We present an application-driven customization methodology for energy-efficient inter-core communication in embedded multiprocessors. The methodology leverages configurable cach...
Chenjie Yu, Xiangrong Zhou, Peter Petrov
IPPS
2008
IEEE
15 years 6 months ago
Design and optimization of a distributed, embedded speech recognition system
In this paper, we present the design and implementation of a distributed sensor network application for embedded, isolated-word, real-time speech recognition. In our system design...
Chung-Ching Shen, William Plishker, Shuvra S. Bhat...
VL
2008
IEEE
120views Visual Languages» more  VL 2008»
15 years 6 months ago
Unobtrusive data acquisition for spreadsheet research
Spreadsheets are one of the most common end-user programming environments in use today, and their importance in the business world continues to grow. Although considered critical ...
Brian Bishop, Kevin McDaid
DEXAW
2007
IEEE
103views Database» more  DEXAW 2007»
15 years 6 months ago
Patterns for Authentication and Authorisation Infrastructures
In line with the growing success of e-commerce demands for an open infrastructure providing security services are growing stronger. Authentication and Authorisation Infrastructure...
Roland Erber, Christian Schläger, Günthe...