Sciweavers

2035 search results - page 269 / 407
» Working memory
Sort
View
DATE
2010
IEEE
190views Hardware» more  DATE 2010»
15 years 8 months ago
Ultra-high throughput string matching for Deep Packet Inspection
Deep Packet Inspection (DPI) involves searching a packet's header and payload against thousands of rules to detect possible attacks. The increase in Internet usage and growing...
Alan Kennedy, Xiaojun Wang, Zhen Liu, Bin Liu
ICS
1999
Tsinghua U.
15 years 8 months ago
Fast cluster failover using virtual memory-mapped communication
This paper proposes a novel way to use virtual memorymapped communication (VMMC) to reduce the failover time on clusters. With the VMMC model, applications’ virtual address spac...
Yuanyuan Zhou, Peter M. Chen, Kai Li
ISWC
1998
IEEE
15 years 8 months ago
StartleCam: A Cybernetic Wearable Camera
StartleCam is a wearable video camera, computer, and sensing system, which enables the camera to be controlled via both conscious and preconscious events involving the wearer. Tra...
Jennifer Healey, Rosalind W. Picard
ICMCS
1997
IEEE
131views Multimedia» more  ICMCS 1997»
15 years 8 months ago
A Novel Video Layout Strategy for Near-Video-on-Demand Servers
Near-Video-on-Demand (NVOD) provides customers with a service model completely different from true Video-on-Demand (VOD). In the NVOD service model, customers’ requests are not ...
Shenze Chen, Manu Thapar
STOC
2010
ACM
185views Algorithms» more  STOC 2010»
15 years 8 months ago
Measuring independence of datasets
Approximating pairwise, or k-wise, independence with sublinear memory is of considerable importance in the data stream model. In the streaming model the joint distribution is give...
Vladimir Braverman, Rafail Ostrovsky