Sciweavers

1804 search results - page 284 / 361
» Intrusion Detection Using Sequences of System Calls
Sort
View
FODO
1998
Springer
242views Algorithms» more  FODO 1998»
14 years 1 months ago
Optimizing OID Indexing Cost in Temporal Object-Oriented Database Systems
In object-oriented database systems (OODB) with logical OIDs, an OID index (OIDX) is needed to map from OID to the physical location of the object. In a transaction time temporal ...
Kjetil Nørvåg, Kjell Bratbergsengen
CDC
2008
IEEE
134views Control Systems» more  CDC 2008»
14 years 3 months ago
Networked control systems with packet delays and losses
— We investigate the effect of packet delays and packet drops on networked control systems. First we consider the problem of where to locate a controller or state estimator in a...
Craig L. Robinson, P. R. Kumar
BMCBI
2008
163views more  BMCBI 2008»
13 years 9 months ago
The Annotation, Mapping, Expression and Network (AMEN) suite of tools for molecular systems biology
Background: High-throughput genome biological experiments yield large and multifaceted datasets that require flexible and user-friendly analysis tools to facilitate their interpre...
Frédéric Chalmel, Michael Primig
ICPR
2006
IEEE
14 years 10 months ago
Learning Policies for Efficiently Identifying Objects of Many Classes
Viola and Jones (VJ) cascade classification methods have proven to be very successful in detecting objects belonging to a single class -- e.g., faces. This paper addresses the mor...
Ahmed M. Elgammal, Ramana Isukapalli, Russell Grei...
MAM
2007
157views more  MAM 2007»
13 years 8 months ago
Executing large algorithms on low-capacity FPGAs using flowpath partitioning and runtime reconfiguration
This paper describes a new method of executing a software program on an FPGA for embedded systems. Rather than combine reconfigurable logic with a microprocessor core, this method...
Darrin M. Hanna, Michael DuChene