Sciweavers

2168 search results - page 284 / 434
» Using Approximation Hardness to Achieve Dependable Computati...
Sort
View
ISCA
2011
IEEE
294views Hardware» more  ISCA 2011»
14 years 7 months ago
Moguls: a model to explore the memory hierarchy for bandwidth improvements
In recent years, the increasing number of processor cores and limited increases in main memory bandwidth have led to the problem of the bandwidth wall, where memory bandwidth is b...
Guangyu Sun, Christopher J. Hughes, Changkyu Kim, ...
166
Voted
CCS
2007
ACM
15 years 8 months ago
Analyzing network traffic to detect self-decrypting exploit code
Remotely-launched software exploits are a common way for attackers to intrude into vulnerable computer systems. As detection techniques improve, remote exploitation techniques are...
Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Pu...
KDD
2006
ACM
136views Data Mining» more  KDD 2006»
16 years 4 months ago
Very sparse random projections
There has been considerable interest in random projections, an approximate algorithm for estimating distances between pairs of points in a high-dimensional vector space. Let A Rn...
Ping Li, Trevor Hastie, Kenneth Ward Church
168
Voted
ICTAI
1997
IEEE
15 years 7 months ago
GA-Based Performance Analysis of Network Protocols
This paper tackles the problem of analyzing the correctness and performance of a computer network protocol. Given the complexity of the problem, no currently used technique is abl...
Mario Baldi, Fulvio Corno, Maurizio Rebaudengo, Gi...
MICCAI
2010
Springer
15 years 2 months ago
Texture Guided Active Appearance Model Propagation for Prostate Segmentation
Fusion of Magnetic Resonance Imaging (MRI) and Trans Rectal Ultra Sound (TRUS) images during TRUS guided prostate biopsy improves localization of the malignant tissues. Segmented p...
Soumya Ghose, Arnau Oliver, Robert Marti, Xavier L...