Search
Now showing items 41-50 of 55
Malware Analysis using Profile Hidden Markov Models and Intrusion Detection in a Stream Learning Setting
(2018-02-18)
In the last decade, a lot of machine learning and data mining based approaches have been used in the areas of intrusion detection, malware detection and classification and also traffic analysis. In the area of malware ...
Low Overhead Soft Error Mitigation Methodologies
(2018-03-06)
CMOS technology scaling is bringing new challenges to the designers in the form of new failure modes. The challenges include long term reliability failures and particle strike induced random failures. Studies have shown ...
A Runtime Framework for Regular and Irregular Message-Driven Parallel Applications on GPU Systems
(2018-02-28)
The effective use of GPUs for accelerating applications depends on a number of factors including effective asynchronous use of heterogeneous resources, reducing data transfer between CPU and GPU, increasing occupancy of ...
Adaptive Grid Meta Scheduling - A QoS Perspective
(2011-09-06)
Performance Measurement Of A Java Virtual Machine
(2011-11-16)
One To Mant And Many To Many Collective Communication Operations On Grids
(2008-01-16)
Collective Communication Operations are widely used in MPI applications and play an important role in their performance. Hence, various projects have focused on optimization of collective communications for various kinds ...
Emulating Variable Block Size Caches
(2013-08-02)
Efficient Resource Usage Modelling
(2011-11-16)

