Sciweavers

1804 search results - page 284 / 361
» Intrusion Detection Using Sequences of System Calls
Sort
View
FODO
1998
Springer
242views Algorithms» more  FODO 1998»
15 years 7 months ago
Optimizing OID Indexing Cost in Temporal Object-Oriented Database Systems
In object-oriented database systems (OODB) with logical OIDs, an OID index (OIDX) is needed to map from OID to the physical location of the object. In a transaction time temporal ...
Kjetil Nørvåg, Kjell Bratbergsengen
CDC
2008
IEEE
134views Control Systems» more  CDC 2008»
15 years 9 months ago
Networked control systems with packet delays and losses
— We investigate the effect of packet delays and packet drops on networked control systems. First we consider the problem of where to locate a controller or state estimator in a...
Craig L. Robinson, P. R. Kumar
BMCBI
2008
163views more  BMCBI 2008»
15 years 3 months ago
The Annotation, Mapping, Expression and Network (AMEN) suite of tools for molecular systems biology
Background: High-throughput genome biological experiments yield large and multifaceted datasets that require flexible and user-friendly analysis tools to facilitate their interpre...
Frédéric Chalmel, Michael Primig
ICPR
2006
IEEE
16 years 4 months ago
Learning Policies for Efficiently Identifying Objects of Many Classes
Viola and Jones (VJ) cascade classification methods have proven to be very successful in detecting objects belonging to a single class -- e.g., faces. This paper addresses the mor...
Ahmed M. Elgammal, Ramana Isukapalli, Russell Grei...
MAM
2007
157views more  MAM 2007»
15 years 3 months ago
Executing large algorithms on low-capacity FPGAs using flowpath partitioning and runtime reconfiguration
This paper describes a new method of executing a software program on an FPGA for embedded systems. Rather than combine reconfigurable logic with a microprocessor core, this method...
Darrin M. Hanna, Michael DuChene