Sciweavers

441 search results - page 68 / 89
» Some Implications of Comparing Brain and Computer Processing
Sort
View
104
Voted
IJNSEC
2007
119views more  IJNSEC 2007»
15 years 2 months ago
Evolutionary Design of Intrusion Detection Programs
Intrusion detection is the process of monitoring the events occurring in a computer system or network and analyzing them for signs of intrusions, defined as attempts to compromis...
Ajith Abraham, Crina Grosan, Carlos Martín-...
130
Voted
PVM
2010
Springer
15 years 15 days ago
Implementing MPI on Windows: Comparison with Common Approaches on Unix
Commercial HPC applications are often run on clusters that use the Microsoft Windows operating system and need an MPI implementation that runs efficiently in the Windows environmen...
Jayesh Krishna, Pavan Balaji, Ewing L. Lusk, Rajee...
156
Voted
ICCV
2011
IEEE
14 years 2 months ago
A Nonparametric Riemannian Framework on Tensor Field with Application to Foreground Segmentation
Background modelling on tensor field has recently been proposed for foreground detection tasks. Taking into account the Riemannian structure of the tensor manifold, recent resear...
Rui Caseiro, João F. Henriques, Pedro Martins, Jo...
POST
2012
218views more  POST 2012»
13 years 10 months ago
A Core Calculus for Provenance
Provenance is an increasing concern due to the revolution in sharing and processing scientific data on the Web and in other computer systems. It is proposed that many computer sys...
Umut A. Acar, Amal Ahmed, James Cheney, Roly Perer...
119
Voted
IPPS
2010
IEEE
15 years 16 days ago
On the parallelisation of MCMC by speculative chain execution
Abstract--The increasing availability of multi-core and multiprocessor architectures provides new opportunities for improving the performance of many computer simulations. Markov C...
Jonathan M. R. Byrd, Stephen A. Jarvis, Abhir H. B...