Sciweavers

4155 search results - page 751 / 831
» External Memory Algorithms
Sort
View
SIGCOMM
2010
ACM
13 years 10 months ago
NetShield: massive semantics-based vulnerability signature matching for high-speed networks
Accuracy and speed are the two most important metrics for Network Intrusion Detection/Prevention Systems (NIDS/NIPSes). Due to emerging polymorphic attacks and the fact that in ma...
Zhichun Li, Gao Xia, Hongyu Gao, Yi Tang, Yan Chen...
SMA
2010
ACM
231views Solid Modeling» more  SMA 2010»
13 years 10 months ago
Conservative swept volume boundary approximation
We present a novel technique for approximating the boundary of a swept volume. The generator given by an input triangle mesh is rendered under all rigid transformations of a discr...
Andreas von Dziegielewski, R. Erbes, Elmar Sch&oum...
ACTA
2010
191views more  ACTA 2010»
13 years 10 months ago
Automata-based verification of programs with tree updates
This paper describes an effective verification procedure for imperative programs that handle (balanced) tree-like data structures. Since the verification problem considered is unde...
Peter Habermehl, Radu Iosif, Tomás Vojnar
CGF
2008
217views more  CGF 2008»
13 years 10 months ago
A Flexible Kernel for Adaptive Mesh Refinement on GPU
We present a flexible GPU kernel for adaptive on-the-fly refinement of meshes with arbitrary topology. By simply reserving a small amount of GPU memory to store a set of adaptive ...
Tamy Boubekeur, Christophe Schlick
CGF
2008
165views more  CGF 2008»
13 years 10 months ago
GPU-based Fast Ray Casting for a Large Number of Metaballs
Metaballs are implicit surfaces widely used to model curved objects, represented by the isosurface of a density field defined by a set of points. Recently, the results of particle...
Yoshihiro Kanamori, Zoltan Szego, Tomoyuki Nishita