Sciweavers

357 search results - page 39 / 72
» Enhanced sharing analysis techniques: a comprehensive evalua...
Sort
View
JSAC
2006
172views more  JSAC 2006»
13 years 7 months ago
A Memory-Efficient Parallel String Matching Architecture for High-Speed Intrusion Detection
The ability to inspect both packet headers and payloads to identify attack signatures makes network intrusion detection system (NIDS) a promising approach to protect Internet syste...
Hongbin Lu, Kai Zheng, Bin Liu, Xin Zhang, Y. Liu
ICS
1999
Tsinghua U.
14 years 1 hour ago
The scalability of multigrain systems
Researchers have recently proposed coupling small- to mediumscale multiprocessors to build large-scale shared memory machines, known as multigrain shared memory systems. Multigrai...
Donald Yeung
PIMRC
2008
IEEE
14 years 2 months ago
Performance analysis of cooperative communications from MAC layer perspectives
—In recent years, cooperative communication has been proposed as a new communication paradigm that incorporates a relay node to assist the direct point-to-point transmission. By ...
Chun-Chieh Liao, Yu-Pin Hsu, Kai-Ten Feng
IUI
2009
ACM
14 years 4 months ago
You can play that again: exploring social redundancy to derive highlight regions in videos
Identifying highlights in multimedia content such as video and audio is currently a very difficult technical problem. We present and evaluate a novel algorithm that identifies hig...
Jose San Pedro, Vaiva Kalnikaité, Steve Whi...
INFOCOM
2000
IEEE
14 years 3 days ago
Performance of Hashing-Based Schemes for Internet Load Balancing
Abstract—Load balancing is a key technique for improving Internet performance. Effective use of load balancing requires good traffic distribution schemes. We study the performan...
Zhiruo Cao, Zheng Wang, Ellen W. Zegura