Sciweavers

148 search results - page 20 / 30
» A multi-task-oriented security processing architecture with ...
Sort
View
CIDM
2011
IEEE
12 years 10 months ago
A GPU-based interactive bio-inspired visual clustering
Abstract—In this work, we present an interactive visual clustering approach for the exploration and analysis of vast volumes of data. The proposed approach is based on a bio-insp...
Ugo Erra, Bernardino Frola, Vittorio Scarano
MICRO
2009
IEEE
113views Hardware» more  MICRO 2009»
14 years 1 months ago
The BubbleWrap many-core: popping cores for sequential acceleration
Many-core scaling now faces a power wall. The gap between the number of cores that fit on a die and the number that can operate simultaneously under the power budget is rapidly i...
Ulya R. Karpuzcu, Brian Greskamp, Josep Torrellas
ICLP
2003
Springer
13 years 12 months ago
Flow Java: Declarative Concurrency for Java
Abstract. Logic variables pioneered by (concurrent) logic and concurrent constraint programming are powerful mechanisms for automatically synchronizing concurrent computations. The...
Frej Drejhammar, Christian Schulte, Per Brand, Sei...
GLOBECOM
2006
IEEE
14 years 23 days ago
Relay-Assisted Spatial Multiplexing in Wireless Fixed Relay Networks
— Fixed relays are expected to be a part of future infrastructure-based wireless networks. Besides coverage extension, such relays can form advanced architectures due to the fle...
Furuzan Atay Onat, Halim Yanikomeroglu, Shalini S....
KBSE
2005
IEEE
14 years 9 days ago
Designing and implementing a family of intrusion detection systems
Intrusion detection systems are distributed applications that analyze the events in a networked system to identify malicious behavior. The analysis is performed using a number of ...
Richard A. Kemmerer