Sciweavers

1079 search results - page 197 / 216
» An Implementation of an Address Generator Using Hash Memorie...
Sort
View
ISCC
2005
IEEE
107views Communications» more  ISCC 2005»
14 years 1 months ago
FTSE: The FNP-Like TCAM Searching Engine
As the Internet grows at a very rapid pace, so does the incidence of attack events and documented unlawful intrusions. The Network Intrusion Detection Systems (NIDSes) are designe...
Rong-Tai Liu, Chia-Nan Kao, Hung-Shen Wu, Ming-Cha...
CASES
2004
ACM
14 years 1 months ago
Hardware assisted control flow obfuscation for embedded processors
+ With more applications being deployed on embedded platforms, software protection becomes increasingly important. This problem is crucial on embedded systems like financial transa...
Xiaotong Zhuang, Tao Zhang, Hsien-Hsin S. Lee, San...
FAST
2010
13 years 8 months ago
DFS: A File System for Virtualized Flash Storage
This paper presents the design, implementation and evaluation of Direct File System (DFS) for virtualized flash storage. of using traditional layers of abstraction, our layers of ...
William K. Josephson, Lars Ailo Bongo, David Flynn...
ISCA
2006
IEEE
130views Hardware» more  ISCA 2006»
13 years 7 months ago
Area-Performance Trade-offs in Tiled Dataflow Architectures
: Tiled architectures, such as RAW, SmartMemories, TRIPS, and WaveScalar, promise to address several issues facing conventional processors, including complexity, wire-delay, and pe...
Steven Swanson, Andrew Putnam, Martha Mercaldi, Ke...
IPPS
2010
IEEE
13 years 5 months ago
Distributed monitoring of conditional entropy for anomaly detection in streams
In this work we consider the problem of monitoring information streams for anomalies in a scalable and efficient manner. We study the problem in the context of network streams wher...
Chrisil Arackaparambil, Sergey Bratus, Joshua Brod...