Sciweavers

971 search results - page 56 / 195
» Comparative Analysis of Arithmetic Coding Computational Comp...
Sort
View
IRI
2006
IEEE
14 years 1 months ago
A similarity based technique for detecting malicious executable files for computer forensics
With the rapidly increasing complexity of computer systems and the sophistication of hacking tools and techniques, there is a crucial need for computer forensic analysis technique...
Jun-Hyung Park, Minsoo Kim, BongNam Noh, James B. ...
MICRO
2003
IEEE
152views Hardware» more  MICRO 2003»
14 years 1 months ago
A Systematic Methodology to Compute the Architectural Vulnerability Factors for a High-Performance Microprocessor
Single-event upsets from particle strikes have become a key challenge in microprocessor design. Techniques to deal with these transient faults exist, but come at a cost. Designers...
Shubhendu S. Mukherjee, Christopher T. Weaver, Joe...
ICPR
2002
IEEE
14 years 9 months ago
Feature Selection for Pose Invariant Face Recognition
One of the major difficulties in face recognition systems is the in-depth pose variation problem. Most face recognition approaches assume that the pose of the face is known. In th...
Berk Gökberk, Ethem Alpaydin, Lale Akarun
TNN
2011
129views more  TNN 2011»
13 years 2 months ago
Minimum Complexity Echo State Network
—Reservoir computing (RC) refers to a new class of state-space models with a fixed state transition structure (the “reservoir”) and an adaptable readout form the state space...
Ali Rodan, Peter Tino
COREGRID
2007
Springer
14 years 2 months ago
Simplifying Grid Application Programming Using Web-Enabled Code Transfer Tools
This paper deals with one of the fundamental properties of grid computing – transferring code between grid nodes and executing it remotely on heterogeneous hosts. Contemporary mi...
Catalin Dumitrescu, Jan Dünnweber, Philipp L&...