Sciweavers

1510 search results - page 189 / 302
» The distributed Karhunen-Loeve transform
Sort
View
IPPS
2007
IEEE
14 years 4 months ago
Recurrent neural networks towards detection of SQL attacks
In the paper we present a new approach based on application of neural networks to detect SQL attacks. SQL attacks are those attacks that take advantage of using SQL statements to ...
Jaroslaw Skaruz, Franciszek Seredynski
IPPS
2007
IEEE
14 years 4 months ago
POET: Parameterized Optimizations for Empirical Tuning
The excessive complexity of both machine architectures and applications have made it difficult for compilers to statically model and predict application behavior. This observatio...
Qing Yi, Keith Seymour, Haihang You, Richard W. Vu...
PDP
2007
IEEE
14 years 4 months ago
RealPeer--A Framework for Simulation-Based Development of Peer-to-Peer Systems
In the process of developing P2P systems simulation has proved to be an essential tool for the evaluation of existing and conceived P2P systems. So far, in practice there has been...
Dieter Hildebrandt, Ludger Bischofs, Wilhelm Hasse...
SMC
2007
IEEE
14 years 4 months ago
An information-theoretic detector based scheme for registration of speckled medical images
— Several studies dealt with medical ultrasound registration. Their similarity metrics relied on pixel-to-pixel intensity comparisons. Hence, they are not well suited to the case...
Zhe Wang, Gregory G. Slabaugh, Gozde B. Unal, Meng...
HPCC
2007
Springer
14 years 4 months ago
Adaptive Computation of Self Sorting In-Place FFTs on Hierarchical Memory Architectures
Computing ”in-place and in-order”FFT poses a very difficult problem on hierarchical memory architectures where data movement can seriously degrade the performance. In this pape...
Ayaz Ali, S. Lennart Johnsson, Jaspal Subhlok