Sciweavers

954 search results - page 37 / 191
» A Modular Approach to Packet Classification: Algorithms and ...
Sort
View
MICRO
2008
IEEE
131views Hardware» more  MICRO 2008»
14 years 2 months ago
Token flow control
As companies move towards many-core chips, an efficient onchip communication fabric to connect these cores assumes critical importance. To address limitations to wire delay scala...
Amit Kumar 0002, Li-Shiuan Peh, Niraj K. Jha
HYBRID
2011
Springer
12 years 7 months ago
Reputation-based networked control with data-corrupting channels
We examine the problem of reliable networked control when the communication channel between the controller and the actuator periodically drops packets and is faulty i.e., corrupts...
Shreyas Sundaram, Jian Chang, Krishna K. Venkatasu...
ICDAR
2003
IEEE
14 years 28 days ago
Classification of Web Documents Using a Graph Model
In this paper we describe work relating to classification of web documents using a graph-based model instead of the traditional vector-based model for document representation. We ...
Adam Schenker, Mark Last, Horst Bunke, Abraham Kan...
ICTAI
2007
IEEE
14 years 1 months ago
Accurate Classification of SAGE Data Based on Frequent Patterns of Gene Expression
In this paper we present a method for classifying accurately SAGE (Serial Analysis of Gene Expression) data. The high dimensionality of the data, namely the large number of featur...
George Tzanis, Ioannis P. Vlahavas
DBSEC
2006
144views Database» more  DBSEC 2006»
13 years 9 months ago
Policy Classes and Query Rewriting Algorithm for XML Security Views
Most state-of-the-art approaches of securing XML documents are based on a partial annotation of an XML tree with security labels which are later propagated to unlabeled nodes of th...
Nataliya Rassadko