Search
Now showing items 11-15 of 15
Malware Analysis using Profile Hidden Markov Models and Intrusion Detection in a Stream Learning Setting
(2018-02-18)
In the last decade, a lot of machine learning and data mining based approaches have been used in the areas of intrusion detection, malware detection and classification and also traffic analysis. In the area of malware ...
A Runtime Framework for Regular and Irregular Message-Driven Parallel Applications on GPU Systems
(2018-02-28)
The effective use of GPUs for accelerating applications depends on a number of factors including effective asynchronous use of heterogeneous resources, reducing data transfer between CPU and GPU, increasing occupancy of ...
Polymorphic ASIC : For Video Decoding
(2018-03-21)
Video applications are becoming ubiquitous in recent times due to an explosion in the number of devices with video capture and display capabilities. Traditionally, video applications are implemented on a variety of devices ...
Adaptive Fault Tolerance Strategies for Large Scale Systems
(2018-03-07)
Exascale systems of the future are predicted to have mean time between node failures (MTBF) of less than one hour. At such low MTBF, the number of processors available for execution of a long running application can widely ...
Low Overhead Soft Error Mitigation Methodologies
(2018-03-06)
CMOS technology scaling is bringing new challenges to the designers in the form of new failure modes. The challenges include long term reliability failures and particle strike induced random failures. Studies have shown ...