Sciweavers

981 search results - page 153 / 197
» Advanced Encryption Standard
Sort
View
ICAISC
2010
Springer
13 years 10 months ago
Do We Need Whatever More Than k-NN?
Abstract. Many sophisticated classification algorithms have been proposed. However, there is no clear methodology of comparing the results among different methods. According to ou...
Miroslaw Kordos, Marcin Blachnik, Dawid Strzempa
IEEEARES
2010
IEEE
13 years 10 months ago
Improving Network Intrusion Detection by Means of Domain-Aware Genetic Programming
—One of the central areas in network intrusion detection is how to build effective systems that are able to distinguish normal from intrusive traffic. In this paper we explore t...
Jorge Blasco Alís, Agustín Orfila, A...
DATE
2008
IEEE
118views Hardware» more  DATE 2008»
13 years 10 months ago
Layout Level Timing Optimization by Leveraging Active Area Dependent Mobility of Strained-Silicon Devices
Advanced MOSFETs such as Strained Silicon (SS) devices have emerged as critical enablers to keep Moore's law on track for sub100nm technologies. Use of Strained Silicon devic...
Ashutosh Chakraborty, Sean X. Shi, David Z. Pan
LREC
2010
234views Education» more  LREC 2010»
13 years 10 months ago
Fine-Grain Morphological Analyzer and Part-of-Speech Tagger for Arabic Text
Morphological analyzers and part-of-speech taggers are key technologies for most text analysis applications. Our aim is to develop a part-of-speech tagger for annotating a wide ra...
Majdi Sawalha, Eric Atwell
DMS
2008
106views Multimedia» more  DMS 2008»
13 years 10 months ago
A Multimedia Data Streams Model for Content-based Information Retrieval
: Multimedia applications nowadays are becoming the standard, for they utilize the enormous human brain computational power. In the past, the Relational Database Model was generali...
Shenoda Guirguis, Rohit Kulkarni, Shi-Kuo Chang