Sciweavers

4235 search results - page 791 / 847
» Process Spaces
Sort
View
ASPLOS
2010
ACM
15 years 9 months ago
Accelerating the local outlier factor algorithm on a GPU for intrusion detection systems
The Local Outlier Factor (LOF) is a very powerful anomaly detection method available in machine learning and classification. The algorithm defines the notion of local outlier in...
Malak Alshawabkeh, Byunghyun Jang, David R. Kaeli
OZCHI
2009
ACM
15 years 9 months ago
Brute force interactions: leveraging intense physical actions in gaming
People use a wide range of intensity when interacting with computers, spanning from subtle to brute force. However, computer interfaces so far have mainly focused on interactions ...
Florian Mueller, Stefan Agamanolis, Frank Vetere, ...
SIGMOD
2009
ACM
161views Database» more  SIGMOD 2009»
15 years 9 months ago
Dependency-aware reordering for parallelizing query optimization in multi-core CPUs
The state of the art commercial query optimizers employ cost-based optimization and exploit dynamic programming (DP) to find the optimal query execution plan (QEP) without evalua...
Wook-Shin Han, Jinsoo Lee
WSDM
2009
ACM
114views Data Mining» more  WSDM 2009»
15 years 9 months ago
Wikipedia pages as entry points for book search
A lot of the world’s knowledge is stored in books, which, as a result of recent mass-digitisation efforts, are increasingly available online. Search engines, such as Google Book...
Marijn Koolen, Gabriella Kazai, Nick Craswell
112
Voted
CCS
2009
ACM
15 years 9 months ago
Secure in-VM monitoring using hardware virtualization
Kernel-level attacks or rootkits can compromise the security of an operating system by executing with the privilege of the kernel. Current approaches use virtualization to gain hi...
Monirul I. Sharif, Wenke Lee, Weidong Cui, Andrea ...