Search
Now showing items 41-50 of 55
Malware Analysis using Profile Hidden Markov Models and Intrusion Detection in a Stream Learning Setting
(2018-02-18)
In the last decade, a lot of machine learning and data mining based approaches have been used in the areas of intrusion detection, malware detection and classification and also traffic analysis. In the area of malware ...
A Runtime Framework for Regular and Irregular Message-Driven Parallel Applications on GPU Systems
(2018-02-28)
The effective use of GPUs for accelerating applications depends on a number of factors including effective asynchronous use of heterogeneous resources, reducing data transfer between CPU and GPU, increasing occupancy of ...
Polymorphic ASIC : For Video Decoding
(2018-03-21)
Video applications are becoming ubiquitous in recent times due to an explosion in the number of devices with video capture and display capabilities. Traditionally, video applications are implemented on a variety of devices ...
Adaptive Fault Tolerance Strategies for Large Scale Systems
(2018-03-07)
Exascale systems of the future are predicted to have mean time between node failures (MTBF) of less than one hour. At such low MTBF, the number of processors available for execution of a long running application can widely ...
Low Overhead Soft Error Mitigation Methodologies
(2018-03-06)
CMOS technology scaling is bringing new challenges to the designers in the form of new failure modes. The challenges include long term reliability failures and particle strike induced random failures. Studies have shown ...
Automatic Compilation Of MATLAB Programs For Synergistic Execution On Heterogeneous Processors
(2014-05-19)
MATLAB is an array language, initially popular for rapid prototyping, but is now being in-creasingly used to develop production code for numerical and scientific applications. Typical MATLAB programs have abundant data ...
An Extension Of Multi Layer IPSec For Supporting Dynamic QoS And Security Requirements
(2013-08-30)
Governments, military, corporations, financial institutions and others exchange a great deal of confidential information using Internet these days. Protecting such confidential information and ensuring their integrity and ...
Applications Of Machine Learning To Anomaly Based Intrusion Detection
(2009-03-02)
This thesis concerns anomaly detection as a mechanism for intrusion detection in a machine learning framework, using two kinds of audit data : system call traces and Unix shell command traces. Anomaly detection systems ...
Search-Optimized Disk Layouts For Suffix-Tree Genomic Indexes
(2013-07-18)
Over the last decade, biological sequence repositories have been growing at an exponential rate. Sophisticated indexing techniques are required to facilitate efficient searching through these humongous genetic repositories. ...
Efficient Execution Of AMR Computations On GPU Systems
(2016-11-16)
Adaptive Mesh Refinement (AMR) is a method which dynamically varies the spatio-temporal resolution of localized mesh regions in numerical simulations, based on the strength of the solution features. Due to high resolution ...