Sciweavers

884 search results - page 128 / 177
» Implementation of the MLP Kernel
Sort
View
CIKM
2009
Springer
14 years 4 months ago
Towards non-directional Xpath evaluation in a RDBMS
XML query languages use directional path expressions to locate data in an XML data collection. They are tightly coupled to the structure of a data collection, and can fail when ev...
Sourav S. Bhowmick, Curtis E. Dyreson, Erwin Leona...
JTRES
2009
ACM
14 years 4 months ago
Avoiding unbounded priority inversion in barrier protocols using gang priority management
Large real-time software systems such as real-time Java virtual machines often use barrier protocols, which work for a dynamically varying number of threads without using centrali...
Harald Röck, Joshua S. Auerbach, Christoph M....
SMA
2009
ACM
137views Solid Modeling» more  SMA 2009»
14 years 4 months ago
Hierarchical molecular interfaces and solvation electrostatics
Electrostatic interactions play a significant role in determining the binding affinity of molecules and drugs. While significant effort has been devoted to the accurate computat...
Chandrajit L. Bajaj, Shun-Chuan Albert Chen, Guoli...
AINA
2008
IEEE
14 years 4 months ago
Annulling SYN Flooding Attacks with Whitelist
SYN flooding is one of classical Denial of Service (DoS) attacks abusing the TCP 3-way handshake process. This attack causes a server not to accept additional connection requests...
Tae Hyung Kim, Young-Sik Choi, Jong Kim, Sung Je H...
ASAP
2008
IEEE
118views Hardware» more  ASAP 2008»
14 years 4 months ago
Bit matrix multiplication in commodity processors
Registers in processors generally contain words or, with the addition of multimedia extensions, short vectors of subwords of bytes or 16-bit elements. In this paper, we view the c...
Yedidya Hilewitz, Cédric Lauradoux, Ruby B....