Sciweavers

1084 search results - page 150 / 217
» Design and Evaluation of a Selective Compressed Memory Syste...
Sort
View
NCS
2008
96views more  NCS 2008»
15 years 5 months ago
Evolutionary Reproduction of Dutch Masters: The Mondriaan and Escher Evolvers
ct This chapter discusses two applications aiming at evolving images in the styles of two well-known Dutch painters: Mondriaan and Escher. For both cases we have an evaluation crit...
A. E. Eiben
RAID
2009
Springer
15 years 10 months ago
Regular Expression Matching on Graphics Hardware for Intrusion Detection
The expressive power of regular expressions has been often exploited in network intrusion detection systems, virus scanners, and spam filtering applications. However, the flexibl...
Giorgos Vasiliadis, Michalis Polychronakis, Spyros...
CODES
2005
IEEE
15 years 10 months ago
Enhancing security through hardware-assisted run-time validation of program data properties
The growing number of information security breaches in electronic and computing systems calls for new design paradigms that consider security as a primary design objective. This i...
Divya Arora, Anand Raghunathan, Srivaths Ravi, Nir...
ISCA
2012
IEEE
260views Hardware» more  ISCA 2012»
13 years 6 months ago
A case for exploiting subarray-level parallelism (SALP) in DRAM
Modern DRAMs have multiple banks to serve multiple memory requests in parallel. However, when two requests go to the same bank, they have to be served serially, exacerbating the h...
Yoongu Kim, Vivek Seshadri, Donghyuk Lee, Jamie Li...
WWW
2005
ACM
16 years 5 months ago
G-ToPSS: fast filtering of graph-based metadata
RDF is increasingly being used to represent metadata. RDF Site Summary (RSS) is an application of RDF on the Web that has considerably grown in popularity. However, the way RSS sy...
Milenko Petrovic, Haifeng Liu, Hans-Arno Jacobsen