Sciweavers

990 search results - page 179 / 198
» An efficient data structure for network anomaly detection
Sort
View
ISNN
2010
Springer
14 years 19 days ago
Applications of Second Order Blind Identification to High-Density EEG-Based Brain Imaging: A Review
In the context of relating specific brain functions to specific brain structures, second-order blind identification (SOBI) is one of the blind source separation algorithms that hav...
Akaysha Tang
PERCOM
2009
ACM
14 years 8 months ago
Programmable Presence Virtualization for Next-Generation Context-Based Applications
Abstract--Presence, broadly defined as an event publishnotification infrastructure for converged applications, has emerged as a key mechanism for collecting and disseminating conte...
Arup Acharya, Nilanjan Banerjee, Dipanjan Chakrabo...
FPGA
2006
ACM
117views FPGA» more  FPGA 2006»
13 years 11 months ago
Context-free-grammar based token tagger in reconfigurable devices
In this paper, we present reconfigurable hardware architecture for detecting semantics of streaming data on 1+ Gbps networks. The design leverages on the characteristics of contex...
Young H. Cho, James Moscola, John W. Lockwood
ANCS
2007
ACM
13 years 12 months ago
Curing regular expressions matching algorithms from insomnia, amnesia, and acalculia
The importance of network security has grown tremendously and a collection of devices have been introduced, which can improve the security of a network. Network intrusion detectio...
Sailesh Kumar, Balakrishnan Chandrasekaran, Jonath...
BMCBI
2010
178views more  BMCBI 2010»
13 years 8 months ago
Applications of a formal approach to decipher discrete genetic networks
Background: A growing demand for tools to assist the building and analysis of biological networks exists in systems biology. We argue that the use of a formal approach is relevant...
Fabien Corblin, Eric Fanchon, Laurent Trilling