Sciweavers

227 search results - page 28 / 46
» Development and implementation of an algorithm for detection...
Sort
View
ISCA
2005
IEEE
134views Hardware» more  ISCA 2005»
14 years 1 months ago
A High Throughput String Matching Architecture for Intrusion Detection and Prevention
Network Intrusion Detection and Prevention Systems have emerged as one of the most effective ways of providing security to those connected to the network, and at the heart of alm...
Lin Tan, Timothy Sherwood
BMCBI
2008
160views more  BMCBI 2008»
13 years 7 months ago
Predicting cancer involvement of genes from heterogeneous data
Background: Systematic approaches for identifying proteins involved in different types of cancer are needed. Experimental techniques such as microarrays are being used to characte...
Ramon Aragues, Chris Sander, Baldo Oliva
CCGRID
2009
IEEE
14 years 2 months ago
Multi-scale Real-Time Grid Monitoring with Job Stream Mining
—The ever increasing scale and complexity of large computational systems ask for sophisticated management tools, paving the way toward Autonomic Computing. A first step toward A...
Xiangliang Zhang, Michèle Sebag, Céc...
MASCOTS
2003
13 years 8 months ago
Toward Scaling Network Emulation using Topology Partitioning
Scalability is the primary challenge to studying large complex network systems with network emulation. This paper studies topology partitioning, assigning disjoint pieces of the n...
Ken Yocum, Ethan Eade, Julius Degesys, David Becke...
TRIDENTCOM
2006
IEEE
14 years 1 months ago
EVEREST testbed: QoS management evaluation in B3G networks
This paper describes the motivation, methodology and implementation approach of the testbed that has been developed in the framework of the EVEREST project. Such testbed is used f...
Ramon Ferrús, Antoni Gelonch, Ferran Casade...