Sciweavers

884 search results - page 63 / 177
» Implementation of the MLP Kernel
Sort
View
ACSAC
2003
IEEE
14 years 3 months ago
Goalkeeper: Close-In Interface Protection
This paper discusses a potential security issue in common operating system and application environments regarding dynamically attached devices and device interfaces. A set of coun...
Stephen D. Wolthusen
SOSP
2005
ACM
14 years 6 months ago
Pioneer: verifying code integrity and enforcing untampered code execution on legacy systems
We propose a primitive, called Pioneer, as a first step towards verifiable code execution on untrusted legacy hosts. Pioneer does not require any hardware support such as secure...
Arvind Seshadri, Mark Luk, Elaine Shi, Adrian Perr...
ISCAS
2008
IEEE
173views Hardware» more  ISCAS 2008»
14 years 4 months ago
Analysis of video filtering on the cell processor
— In this paper an analysis of bi-dimensional video filtering on the Cell Broadband Engine Processor is presented. To evaluate the processor, a highly adaptive filtering algori...
Arnaldo Azevedo, Cor Meenderinck, Ben H. H. Juurli...
PARA
2004
Springer
14 years 3 months ago
Analyzing Advanced PDE Solvers Through Simulation
Abstract. By simulating a real computer it is possible to gain a detailed knowledge of the cache memory utilization of an application, e.g., a partial differential equation (PDE) s...
Henrik Johansson, Dan Wallin, Sverker Holmgren
ICANN
2001
Springer
14 years 2 months ago
Incremental Support Vector Machine Learning: A Local Approach
Abstract. In this paper, we propose and study a new on-line algorithm for learning a SVM based on Radial Basis Function Kernel: Local Incremental Learning of SVM or LISVM. Our meth...
Liva Ralaivola, Florence d'Alché-Buc