Search
Now showing items 71-80 of 116
Malware Analysis using Profile Hidden Markov Models and Intrusion Detection in a Stream Learning Setting
(2018-02-18)
In the last decade, a lot of machine learning and data mining based approaches have been used in the areas of intrusion detection, malware detection and classification and also traffic analysis. In the area of malware ...
Low Overhead Soft Error Mitigation Methodologies
(2018-03-06)
CMOS technology scaling is bringing new challenges to the designers in the form of new failure modes. The challenges include long term reliability failures and particle strike induced random failures. Studies have shown ...
A Runtime Framework for Regular and Irregular Message-Driven Parallel Applications on GPU Systems
(2018-02-28)
The effective use of GPUs for accelerating applications depends on a number of factors including effective asynchronous use of heterogeneous resources, reducing data transfer between CPU and GPU, increasing occupancy of ...
Communication Structure and Mixing Patterns in Complex Networks
(2018-04-05)
Real world systems like biological, social, technological, infrastructural and many others can be modeled as networks. The field of network science aims to study these complex networks and understand their structure and ...
Adaptive Grid Meta Scheduling - A QoS Perspective
(2011-09-06)
Performance Measurement Of A Java Virtual Machine
(2011-11-16)
One To Mant And Many To Many Collective Communication Operations On Grids
(2008-01-16)
Collective Communication Operations are widely used in MPI applications and play an important role in their performance. Hence, various projects have focused on optimization of collective communications for various kinds ...

