Sciweavers

2875 search results - page 521 / 575
» Distributed Reactive Machines
Sort
View
139
Voted
IPPS
2009
IEEE
15 years 9 months ago
Input-independent, scalable and fast string matching on the Cray XMT
String searching is at the core of many security and network applications like search engines, intrusion detection systems, virus scanners and spam filters. The growing size of o...
Oreste Villa, Daniel G. Chavarría-Miranda, ...
168
Voted
CLOUDCOM
2009
Springer
15 years 9 months ago
Cloudbus Toolkit for Market-Oriented Cloud Computing
This keynote paper: (1) presents the 21st century vision of computing and identifies various IT paradigms promising to deliver computing as a utility; (2) defines the architecture ...
Rajkumar Buyya, Suraj Pandey, Christian Vecchiola
SIGMETRICS
2009
ACM
122views Hardware» more  SIGMETRICS 2009»
15 years 9 months ago
Botnet spam campaigns can be long lasting: evidence, implications, and analysis
Accurately identifying spam campaigns launched by a large number of bots in a botnet allows for accurate spam campaign signature generation and hence is critical to defeating spam...
Abhinav Pathak, Feng Qian, Y. Charlie Hu, Zhuoqing...
123
Voted
ACSAC
2007
IEEE
15 years 8 months ago
Retrofitting the IBM POWER Hypervisor to Support Mandatory Access Control
Server virtualization more readily enables the collocation of disparate workloads on a shared physical platform. When employed on systems across a data center, the result can be a...
Enriquillo Valdez, Reiner Sailer, Ronald Perez
CVPR
2007
IEEE
15 years 8 months ago
Learning Generative Models via Discriminative Approaches
Generative model learning is one of the key problems in machine learning and computer vision. Currently the use of generative models is limited due to the difficulty in effective...
Zhuowen Tu