Sciweavers

207 search results - page 13 / 42
» Detecting Bottleneck in n-Tier IT Applications Through Analy...
Sort
View
PR
2006
155views more  PR 2006»
13 years 7 months ago
3D face detection using curvature analysis
Face detection is a crucial preliminary in many applications. Most all the approaches to face detection have focused on the use of two-dimensional images. We present an innovative...
Alessandro Colombo, Claudio Cusano, Raimondo Schet...
BMCBI
2006
109views more  BMCBI 2006»
13 years 7 months ago
GPNN: Power studies and applications of a neural network method for detecting gene-gene interactions in studies of human disease
Background: The identification and characterization of genes that influence the risk of common, complex multifactorial disease primarily through interactions with other genes and ...
Alison A. Motsinger, Stephen L. Lee, George Mellic...
CCS
2008
ACM
13 years 9 months ago
Principled reasoning and practical applications of alert fusion in intrusion detection systems
It is generally believed that by combining several diverse intrusion detectors (i.e., forming an IDS ensemble), we may achieve better performance. However, there has been very lit...
Guofei Gu, Alvaro A. Cárdenas, Wenke Lee
CCS
2010
ACM
13 years 8 months ago
Sidebuster: automated detection and quantification of side-channel leaks in web application development
A web application is a "two-part" program, with its components deployed both in the browser and in the web server. The communication between these two components inevita...
Kehuan Zhang, Zhou Li, Rui Wang 0010, XiaoFeng Wan...
PCI
2005
Springer
14 years 1 months ago
Tuning Blocked Array Layouts to Exploit Memory Hierarchy in SMT Architectures
Cache misses form a major bottleneck for memory-intensive applications, due to the significant latency of main memory accesses. Loop tiling, in conjunction with other program tran...
Evangelia Athanasaki, Kornilios Kourtis, Nikos Ana...