Sciweavers

935 search results - page 100 / 187
» Designing and implementing a family of intrusion detection s...
Sort
View
ISPASS
2009
IEEE
14 years 3 months ago
Evaluating GPUs for network packet signature matching
Modern network devices employ deep packet inspection to enable sophisticated services such as intrusion detection, traffic shaping, and load balancing. At the heart of such servi...
Randy Smith, Neelam Goyal, Justin Ormont, Karthike...
ASPLOS
2011
ACM
13 years 20 days ago
Mementos: system support for long-running computation on RFID-scale devices
Transiently powered computing devices such as RFID tags, kinetic energy harvesters, and smart cards typically rely on programs that complete a task under tight time constraints be...
Benjamin Ransford, Jacob Sorber, Kevin Fu
AIPR
2005
IEEE
14 years 2 months ago
Hyperspectral Detection Algorithms: Operational, Next Generation, on the Horizon
Abstract—The multi-band target detection algorithms implemented in hyperspectral imaging systems represent perhaps the most successful example of image fusion. A core suite of su...
A. Schaum
ECBS
2000
IEEE
155views Hardware» more  ECBS 2000»
14 years 1 months ago
A Component-Driven Architecture for Internet-Based, Directly Reactive Information Systems
In this paper we focus on the architecture-based development of what we call directly reactive information systems on the Internet. These systems exhibit full content management o...
René Stolle, Wilhelm Rossak, Vassilka Kirov...
IPPS
2006
IEEE
14 years 3 months ago
Recent advances in checkpoint/recovery systems
Checkpoint and Recovery (CPR) systems have many uses in high-performance computing. Because of this, many developers have implemented it, by hand, into their applications. One of ...
Greg Bronevetsky, Rohit Fernandes, Daniel Marques,...