Sciweavers

441 search results - page 68 / 89
» Some Implications of Comparing Brain and Computer Processing
Sort
View
IJNSEC
2007
119views more  IJNSEC 2007»
14 years 9 months ago
Evolutionary Design of Intrusion Detection Programs
Intrusion detection is the process of monitoring the events occurring in a computer system or network and analyzing them for signs of intrusions, defined as attempts to compromis...
Ajith Abraham, Crina Grosan, Carlos Martín-...
PVM
2010
Springer
14 years 7 months ago
Implementing MPI on Windows: Comparison with Common Approaches on Unix
Commercial HPC applications are often run on clusters that use the Microsoft Windows operating system and need an MPI implementation that runs efficiently in the Windows environmen...
Jayesh Krishna, Pavan Balaji, Ewing L. Lusk, Rajee...
ICCV
2011
IEEE
13 years 9 months ago
A Nonparametric Riemannian Framework on Tensor Field with Application to Foreground Segmentation
Background modelling on tensor field has recently been proposed for foreground detection tasks. Taking into account the Riemannian structure of the tensor manifold, recent resear...
Rui Caseiro, João F. Henriques, Pedro Martins, Jo...
POST
2012
218views more  POST 2012»
13 years 5 months ago
A Core Calculus for Provenance
Provenance is an increasing concern due to the revolution in sharing and processing scientific data on the Web and in other computer systems. It is proposed that many computer sys...
Umut A. Acar, Amal Ahmed, James Cheney, Roly Perer...
78
Voted
IPPS
2010
IEEE
14 years 7 months ago
On the parallelisation of MCMC by speculative chain execution
Abstract--The increasing availability of multi-core and multiprocessor architectures provides new opportunities for improving the performance of many computer simulations. Markov C...
Jonathan M. R. Byrd, Stephen A. Jarvis, Abhir H. B...