Sciweavers

935 search results - page 141 / 187
» Designing and implementing a family of intrusion detection s...
Sort
View
TIP
2008
175views more  TIP 2008»
13 years 10 months ago
Algorithmic and Architectural Optimizations for Computationally Efficient Particle Filtering
Abstract--In this paper, we analyze the computational challenges in implementing particle filtering, especially to video sequences. Particle filtering is a technique used for filte...
Aswin C. Sankaranarayanan, Ankur Srivastava, Rama ...
ICFP
2010
ACM
13 years 11 months ago
Fortifying macros
Existing macro systems force programmers to make a choice between clarity of specification and robustness. If they choose clarity, they must forgo validating significant parts of ...
Ryan Culpepper, Matthias Felleisen
HAPTICS
2005
IEEE
14 years 4 months ago
Wearable Kinesthetic System for Capturing and Classifying Upper Limb Gesture
Background: Monitoring body kinematics has fundamental relevance in several biological and technical disciplines. In particular the possibility to exactly know the posture may fur...
R. Bartalesi, Federico Lorussi, M. Tesconi, Alessa...
TVLSI
2010
13 years 5 months ago
Architectural Enhancement and System Software Support for Program Code Integrity Monitoring in Application-Specific Instruction-
Program code in a computer system can be altered either by malicious security attacks or by various faults in microprocessors. At the instruction level, all code modifications are ...
Hai Lin, Yunsi Fei, Xuan Guan, Zhijie Jerry Shi
SIGCOMM
2000
ACM
14 years 2 months ago
Endpoint admission control: Architectural issues and performance
The traditional approach to implementing admission control, as exemplified by the Integrated Services proposal in the IETF, uses a signalling protocol to establish reservations a...
Lee Breslau, Edward W. Knightly, Scott Shenker, Io...