Sciweavers

3641 search results - page 679 / 729
» On Computability of Pattern Recognition Problems
Sort
View
SP
2007
IEEE
107views Security Privacy» more  SP 2007»
14 years 4 months ago
Lurking in the Shadows: Identifying Systemic Threats to Kernel Data
The integrity of kernel code and data is fundamental to the integrity of the computer system. Tampering with the kernel data is an attractive venue for rootkit writers since malic...
Arati Baliga, Pandurang Kamat, Liviu Iftode
AUSDM
2007
Springer
145views Data Mining» more  AUSDM 2007»
14 years 4 months ago
Discovering Frequent Sets from Data Streams with CPU Constraint
Data streams are usually generated in an online fashion characterized by huge volume, rapid unpredictable rates, and fast changing data characteristics. It has been hence recogniz...
Xuan Hong Dang, Wee Keong Ng, Kok-Leong Ong, Vince...
FPL
2007
Springer
105views Hardware» more  FPL 2007»
14 years 4 months ago
Time Predictable CPU and DMA Shared Memory Access
In this paper, we propose a first step towards a time predictable computer architecture for single-chip multiprocessing (CMP). CMP is the actual trend in server and desktop syste...
Christof Pitter, Martin Schoeberl
GECCO
2007
Springer
155views Optimization» more  GECCO 2007»
14 years 4 months ago
Observing the swarm behaviour during its evolutionary design
Evolutionary Algorithms (EAs) can be used for designing Particle Swarm Optimization (PSO) algorithms that work, in some cases, considerably better than the human-designed ones. By...
Laura Diosan, Mihai Oltean
SPIRE
2007
Springer
14 years 4 months ago
Approximate String Matching with Lempel-Ziv Compressed Indexes
Abstract. A compressed full-text self-index for a text T is a data structure requiring reduced space and able of searching for patterns P in T. Furthermore, the structure can repro...
Luís M. S. Russo, Gonzalo Navarro, Arlindo ...