Sciweavers

1291 search results - page 207 / 259
» Intrusion Detection for Distributed Applications
Sort
View
ICS
2001
Tsinghua U.
14 years 1 months ago
Slice-processors: an implementation of operation-based prediction
We describe the Slice Processor micro-architecture that implements a generalized operation-based prefetching mechanism. Operation-based prefetchers predict the series of operation...
Andreas Moshovos, Dionisios N. Pnevmatikatos, Amir...
MOBICOM
2004
ACM
14 years 2 months ago
Power conservation and quality of surveillance in target tracking sensor networks
Target tracking is an important application of wireless sensor networks. In this application, the sensor nodes collectively monitor and track the movement of an event or target ob...
Chao Gui, Prasant Mohapatra
KDD
2008
ACM
195views Data Mining» more  KDD 2008»
14 years 9 months ago
Learning from multi-topic web documents for contextual advertisement
Contextual advertising on web pages has become very popular recently and it poses its own set of unique text mining challenges. Often advertisers wish to either target (or avoid) ...
Yi Zhang, Arun C. Surendran, John C. Platt, Mukund...
DRM
2005
Springer
14 years 2 months ago
Watermarking and ownership problem: a revisit
Watermarking technologies have been envisioned as a potential means for establishing ownership on digital media objects. However, achievable robustness and false-positive rates of...
Husrev T. Sencar, Nasir D. Memon
BMCBI
2007
95views more  BMCBI 2007»
13 years 8 months ago
ZPS: visualization of recent adaptive evolution of proteins
Background: Detection of adaptive amino acid changes in proteins under recent short-term selection is of great interest for researchers studying microevolutionary processes in mic...
Sujay Chattopadhyay, Daniel E. Dykhuizen, Evgeni V...