Sciweavers

10435 search results - page 291 / 2087
» Measuring system normality
Sort
View
119
Voted
LCTRTS
2009
Springer
15 years 9 months ago
Guaranteeing instruction fetch behavior with a lookahead instruction fetch engine (LIFE)
Instruction fetch behavior has been shown to be very regular and predictable, even for diverse application areas. In this work, we propose the Lookahead Instruction Fetch Engine (...
Stephen Roderick Hines, Yuval Peress, Peter Gavin,...
131
Voted
IMC
2009
ACM
15 years 9 months ago
ANTIDOTE: understanding and defending against poisoning of anomaly detectors
Statistical machine learning techniques have recently garnered increased popularity as a means to improve network design and security. For intrusion detection, such methods build ...
Benjamin I. P. Rubinstein, Blaine Nelson, Ling Hua...
100
Voted
IJCNN
2006
IEEE
15 years 8 months ago
Design of Optimal PI Controllers for Doubly Fed Induction Generators Driven by Wind Turbines Using Particle Swarm Optimization
– When subjected to transient disturbances in the power grid, the variable frequency converter (VFC) is the most sensitive part in the variable-speed wind turbine generator syste...
Wei Qiao, Ganesh K. Venayagamoorthy, Ronald G. Har...
125
Voted
ICPR
2002
IEEE
15 years 7 months ago
Feasibility of Hough-Transform-Based Iris Localisation for Real-Time-Application
We present a fast method for locating iris features in frontal face images based on the Hough transform. It consists of an initial iris detection step and a tracking step which us...
Klaus D. Tönnies, Frank Behrens, Melanie Aurn...
IPPS
1999
IEEE
15 years 7 months ago
The Impact of Memory Hierarchies on Cluster Computing
Using off-the-shelf commodity workstations and PCs to build a cluster for parallel computing has become a common practice. A choice of a cost-effective cluster computing platform ...
Xing Du, Xiaodong Zhang