Sciweavers

613 search results - page 122 / 123
» Some Observations on Holographic Algorithms
Sort
View
TDSC
2010
191views more  TDSC 2010»
13 years 6 months ago
SigFree: A Signature-Free Buffer Overflow Attack Blocker
—We propose SigFree, an online signature-free out-of-the-box application-layer method for blocking code-injection buffer overflow attack messages targeting at various Internet se...
Xinran Wang, Chi-Chun Pan, Peng Liu, Sencun Zhu
IPPS
2010
IEEE
13 years 5 months ago
Acceleration of spiking neural networks in emerging multi-core and GPU architectures
Recently, there has been strong interest in large-scale simulations of biological spiking neural networks (SNN) to model the human brain mechanisms and capture its inference capabi...
Mohammad A. Bhuiyan, Vivek K. Pallipuram, Melissa ...
GVD
2009
108views Database» more  GVD 2009»
13 years 5 months ago
Privacy Challenges for Database Systems
Over the last years the means to collect personal data implicitly or explicitly over the Web and by various kinds of sensors and to combine data for profiling individuals has dram...
Johann Christoph Freytag
BMCBI
2011
13 years 2 months ago
Tiling array data analysis: a multiscale approach using wavelets
Background: Tiling array data is hard to interpret due to noise. The wavelet transformation is a widely used technique in signal processing for elucidating the true signal from no...
Alexander Karpikov, Joel S. Rozowsky, Mark Gerstei...
EUROSYS
2011
ACM
12 years 11 months ago
DepSky: dependable and secure storage in a cloud-of-clouds
The increasing popularity of cloud storage services has lead companies that handle critical data to think about using these services for their storage needs. Medical record databa...
Alysson Neves Bessani, Miguel P. Correia, Bruno Qu...