Sciweavers

1831 search results - page 352 / 367
» Time Constraints in Workflow Systems
Sort
View
INFOCOM
2007
IEEE
14 years 2 months ago
TriBiCa: Trie Bitmap Content Analyzer for High-Speed Network Intrusion Detection
Abstract—Deep packet inspection (DPI) is often used in network intrusion detection and prevention systems (NIDPS), where incoming packet payloads are compared against known attac...
N. Sertac Artan, H. Jonathan Chao
AVSS
2006
IEEE
14 years 2 months ago
Nonparametric Background Modeling Using the CONDENSATION Algorithm
Background modeling for dynamic scenes is an important problem in the context of real time video surveillance systems. Several nonparametric background models have been proposed t...
Xingzhi Luo, Suchendra M. Bhandarkar, Wei Hua, Hai...
BROADNETS
2006
IEEE
14 years 2 months ago
A Flexible Advance Reservation Model for Multi-Domain WDM Optical Networks
— Advance reservation is a mechanism to guarantee the availability of resources when they are needed. In the context of LambdaGrid, this mechanism is used to provide data-intensi...
Eric He, Xi Wang, Jason Leigh
LCTRTS
2005
Springer
14 years 2 months ago
Cache aware optimization of stream programs
Effective use of the memory hierarchy is critical for achieving high performance on embedded systems. We focus on the class of streaming applications, which is increasingly preval...
Janis Sermulins, William Thies, Rodric M. Rabbah, ...
CAV
2000
Springer
197views Hardware» more  CAV 2000»
14 years 28 days ago
Bounded Model Construction for Monadic Second-Order Logics
Address: Abstraction, Composition, Symmetry, and a Little Deduction: The Remedies to State Explosion . . . . . . . . . . . . . . . . . . . . . . . . . . 1 A. Pnueli Invited Address...
Abdelwaheb Ayari, David A. Basin