Sciweavers

2656 search results - page 430 / 532
» Design and analysis of algorithms reconsidered
Sort
View
FCCM
2007
IEEE
134views VLSI» more  FCCM 2007»
15 years 10 months ago
FPGA-accelerated seed generation in Mercury BLASTP
BLASTP is the most popular tool to perform comparative sequence analysis of protein sequences. An exponential increase in the size of protein sequence databases in recent years, h...
Arpith C. Jacob, Joseph M. Lancaster, Jeremy Buhle...
IAT
2007
IEEE
15 years 10 months ago
Agent-Based Network Intrusion Detection System
The paper presents security platform based on agents as an efficient and robust solution for high-performance intrusion detection system designed for deployment on highspeed netw...
Vojtech Krmicek, Pavel Celeda, Martin Rehák...
ICCCN
2007
IEEE
15 years 10 months ago
Fates: A Granular Approach to Real-Time Anomaly Detection
— Anomaly-based intrusion detection systems have the ability of detecting novel attacks, but in real-time detection, they face the challenges of producing many false alarms and f...
Jeff Janies, Chin-Tser Huang
INFOCOM
2007
IEEE
15 years 10 months ago
Finding Self-Similarities in Opportunistic People Networks
— Opportunistic network is a type of Delay Tolerant Networks (DTN) where network communication opportunities appear opportunistic. In this study, we investigate opportunistic net...
Ling-Jyh Chen, Yung-Chih Chen, Tony Sun, Paruvelli...
AAMAS
2007
Springer
15 years 10 months ago
Networks of Learning Automata and Limiting Games
Learning Automata (LA) were recently shown to be valuable tools for designing Multi-Agent Reinforcement Learning algorithms. One of the principal contributions of LA theory is that...
Peter Vrancx, Katja Verbeeck, Ann Nowé