Modern Network Intrusion Detection Systems (NIDSs) maintain state that helps them accurately detect attacks. Because most NIDSs are signature-based, it is critical to update their...
In this work we propose and evaluate mechanisms for the multiplexing and the integrated delivery of Video and Data Traffic over a Wireless Cellular High Speed Packet Switched Netwo...
Spyros Psychis, Polychronis Koutsakis, Michael Pat...
This paper presents CHeckpointed Early Resource RecYcling (Cherry), a hybrid mode of execution based on ROB and checkpointing that decouples resource recycling and instruction ret...
In this paper we present a multiview registration method for aligning range data. We first align scans pairwise with each other and use the pairwise alignments as constraints that...
—Genetic Algorithms (GAs) are powerful search techniques that are used to solve difficult problems in many disciplines. Unfortunately, they can be very demanding in terms of com...