Search
Now showing items 11-15 of 15
Malware Analysis using Profile Hidden Markov Models and Intrusion Detection in a Stream Learning Setting
(2018-02-18)
In the last decade, a lot of machine learning and data mining based approaches have been used in the areas of intrusion detection, malware detection and classification and also traffic analysis. In the area of malware ...
Low Overhead Soft Error Mitigation Methodologies
(2018-03-06)
CMOS technology scaling is bringing new challenges to the designers in the form of new failure modes. The challenges include long term reliability failures and particle strike induced random failures. Studies have shown ...
A Runtime Framework for Regular and Irregular Message-Driven Parallel Applications on GPU Systems
(2018-02-28)
The effective use of GPUs for accelerating applications depends on a number of factors including effective asynchronous use of heterogeneous resources, reducing data transfer between CPU and GPU, increasing occupancy of ...
Study of Proteome and Transcriptome of Escherichia Coli Bacteria to Probe its Regulatory Aspects
(2018-08-09)
The information flow through the regulatory networks in biological systems has been a rapidly growing field of research. Translation, being a very important regulatory check point, presents itself as a legitimate process ...
Enhancing GPGPU Performance through Warp Scheduling, Divergence Taming and Runtime Parallelizing Transformations
(2018-08-29)
There has been a tremendous growth in the use of Graphics Processing Units (GPU) for the acceleration of general purpose applications. The growth is primarily due to the huge computing power offered by the GPUs and the ...

