Sciweavers

8118 search results - page 1576 / 1624
» The Newton Application Architecture
Sort
View
ASIAN
2004
Springer
117views Algorithms» more  ASIAN 2004»
15 years 7 months ago
The Feature Selection and Intrusion Detection Problems
Cyber security is a serious global concern. The potential of cyber terrorism has posed a threat to national security; meanwhile the increasing prevalence of malware and incidents o...
Andrew H. Sung, Srinivas Mukkamala
EUROPAR
2004
Springer
15 years 7 months ago
Implementing MPI on the BlueGene/L Supercomputer
The BlueGene/L supercomputer will consist of 65,536 dual-processor compute nodes interconnected by two high-speed networks: a three-dimensional torus network and a tree topology ne...
George Almási, Charles Archer, José ...
FPGA
2004
ACM
119views FPGA» more  FPGA 2004»
15 years 7 months ago
A quantitative analysis of the speedup factors of FPGAs over processors
The speedup over a microprocessor that can be achieved by implementing some programs on an FPGA has been extensively reported. This paper presents an analysis, both quantitative a...
Zhi Guo, Walid A. Najjar, Frank Vahid, Kees A. Vis...
GI
2004
Springer
15 years 7 months ago
A Low-Cost Solution for Frequent Symmetric Key Exchange in Ad-hoc Networks
: Next to authentication, secure key exchange is considered the most critical and complex issue regarding ad-hoc network security. We present a low-cost, (i.e. low hardware-complex...
Markus Volkmer, Sebastian Wallner
IDEAL
2004
Springer
15 years 7 months ago
Combining Local and Global Models to Capture Fast and Slow Dynamics in Time Series Data
Many time series exhibit dynamics over vastly different time scales. The standard way to capture this behavior is to assume that the slow dynamics are a “trend”, to de-trend t...
Michael Small
« Prev « First page 1576 / 1624 Last » Next »