Sciweavers

884 search results - page 102 / 177
» Implementation of the MLP Kernel
Sort
View
DAGSTUHL
2006
13 years 11 months ago
Denial of Service Protection with Beaver
We present Beaver, a method and architecture to "build dams" to protect servers from Denial of Service (DoS) attacks. Beaver allows efficient filtering of DoS traffic us...
Gal Badishi, Idit Keidar, Amir Herzberg, Oleg Roma...
ERSA
2004
130views Hardware» more  ERSA 2004»
13 years 11 months ago
Computing Lennard-Jones Potentials and Forces with Reconfigurable Hardware
Abstract-- Technological advances have made FPGAs an attractive platform for the acceleration of complex scientific applications. These applications demand high performance and hig...
Ronald Scrofano, Viktor K. Prasanna
NIPS
2004
13 years 11 months ago
The Entire Regularization Path for the Support Vector Machine
The support vector machine (SVM) is a widely used tool for classification. Many efficient implementations exist for fitting a two-class SVM model. The user has to supply values fo...
Trevor Hastie, Saharon Rosset, Robert Tibshirani, ...
PDPTA
2004
13 years 11 months ago
On the Design and Performance of Remote Disk Drivers for Clusters of PCs
This paper presents the design and performance of remote disk drivers for clusters of Commodity-Off-The-Shelf PCs that fetch disk blocks over System Area Networks. The driver offe...
Vlad Olaru, Walter F. Tichy
SEC
2004
13 years 11 months ago
Recursive Sandboxes: Extending Systrace To Empower Applications
The systrace system-call interposition mechanism has become a popular method for containing untrusted code through program-specific policies enforced by user-level daemons. We desc...
Aleksey Kurchuk, Angelos D. Keromytis