Search For:

Displaying 1-50 out of 28,843 total
S-MAIDS: A Semantic Model for Automated Tuning, Correlation, and Response Selection in Intrusion Detection Systems
Found in: 2013 IEEE 37th Annual Computer Software and Applications Conference (COMPSAC)
By Chris Strasburg,Samik Basu,Johnny S. Wong
Issue Date:July 2013
pp. 319-328
As cyber threats increasingly utilize automated and adaptive attacks to bypass or overwhelm static defenses, the role of intrusion detection and response systems (IDRS) as an active defense layer is becoming more critical. To remain effective against curre...
Design of an S-band 0.35 µm AlGaN/GaN LNA using cascode topology
Found in: 2013 IEEE 16th International Symposium on Design and Diagnostics of Electronic Circuits & Systems (DDECS)
By H. L. Kao,C. S. Yeh,C. L. Cho,B. W. Wang,P. C. Lee,B. H. Wei,H. C. Chiu
Issue Date:April 2013
pp. 250-253
This paper presents an S-band low noise amplifier that uses a two-stage configuration. The first stage has a cascode topology and the second stage has a RC feedback topology. The S-band LNA uses a 0.35 µm AlGaN/GaN HEMT on a Si-substrate. The results show ...
Profile Arthur S. Bland: high performance at Oak Ridge laboratory
Found in: XRDS: Crossroads, The ACM Magazine for Students
By Adrian Scoică, Arthur S. Bland
Issue Date:March 2013
pp. 62-62
A new system allows researchers to discover, reuse, cite, and experiment upon any computational result that is published with a Verifiable Result Identifier.
S-RVM: a secure design for a high-performance java virtual machine
Found in: Proceedings of the sixth ACM workshop on Virtual machines and intermediate languages (VMIL '12)
By David S. Munro, Katrina Falkner, Yuval Yarom
Issue Date:October 2012
pp. 13-22
Reference protection mechanisms, which control the propagation of references, are commonly used to isolate and to provide protection for components that execute within a shared runtime. These mechanisms often incur an overhead for maintaining the isolation...
Effect of Gate-S/D Underlap, Asymmetric and Independent Gate Features in the Minimization of Short Channel Effects in Nanoscale DGMOSFET
Found in: VLSI, IEEE Computer Society Annual Symposium on
By Ramesh Vaddi, S. Dasgupta, R.P. Agarwal
Issue Date:July 2011
pp. 37-42
Asymmetric and independent gate features of DGMOSFETs are explored recently for nano scale applications. This paper investigates minimization of short channel effects based on the independent gate, gate-S/D under lap and asymmetric (in front and back gate ...
Signature Testing and Diagnosis of High Precision S? ADC Dynamic Specifications Using Model Parameter Estimation
Found in: European Test Symposium, IEEE
By S. Kook, A. Banerjee, A. Chatterjee
Issue Date:May 2011
pp. 33-38
Dynamic testing of high-resolution Sigma-Delta (?Â¥Ò) Analog-to-Digital converters (ADCs) is extremely challenging and expensive since it requires the use of spectrally pure stimulus with at least 10dB better signal-to-noise ratio (SNR) and total harmonic ...
Entering the path towards terabit/s wireless links
Found in: 2011 Design, Automation & Test in Europe
By G Fettweis,F Guderian,S Krone
Issue Date:March 2011
pp. 1-6
Wireless communications has been a hot area of technology advancement for the past two decades. As long as memory sizes increase, the demand for higher data rates of communications increases on the same scale. This means that one must understand today's hi...
160Gb/s Serial Line Rates in a Monolithic Optoelectronic Multistage Interconnection Network
Found in: High-Performance Interconnects, Symposium on
By A. Albores-Mejia, K.A. Williams, F. Gomez-Agis, S. Zhang, H.J.S. Dorren, X.J.M. Leijtens, T. de Vries, Y.S. Oei, M.J.R. Heck, L.M. Augustin, R. Notzel, D.J. Robbins, M.K. Smit
Issue Date:August 2009
pp. 157-162
We demonstrate very high line rate serial 160Gb/s data transmission through a semiconductor optical amplifier based multistage switching matrix. This represents both the leading edge in monolithic switching circuit complexity and the highest reported line ...
50GB/s signaling on organic substrates using PMTL technology
Found in: Quality Electronic Design, International Symposium on
By Farhang Yazdani, Jamal S. Izadian
Issue Date:March 2009
pp. 565-568
As the Communication industry migrates toward 40 and 50GB/s SER-DES interfaces and beyond the need for low cost packaging solution becomes mandated. PMTL
Scale-Up Strategies for Processing High-Rate Data Streams in System S
Found in: Data Engineering, International Conference on
By Henrique Andrade, Bugra Gedik, Kun-Lung Wu, Philip S. Yu
Issue Date:April 2009
pp. 1375-1378
High performance stream processing is critical in sense-and-respond application domains – from environmental monitoring to algorithmic trading. In this paper, we focus on language and runtime support for improving the performance of sense-and-respond appli...
Review of "Pro Web 2.0 Application Development with GWT by S. Balaraman," Jeff Dwyer, Apress, 2008, $44.99, ISBN: 9781590599853
Found in: Queue
By S. Balaraman
Issue Date:January 2009
pp. 3-3
The Obama campaign has been praised for its innovative use of technology. What was the key to its success?
New algorithm to enable 400+ TFlop/s sustained performance in simulations of disorder effects in high-Tc superconductors
Found in: SC Conference
By G. Alvarez, M. S. Summers, D. E. Maxwell, M. Eisenbach, J. S. Meredith, J. M. Larkin, J. Levesque, T. A. Maier, P. R. C. Kent, E. F. D'Azevedo, T. C. Schulthess
Issue Date:November 2008
pp. 1-10
Staggering computational and algorithmic advances in recent years now make possible systematic Quantum Monte Carlo (QMC) simulations of high temperature (high-Tc) superconductivity in a microscopic model, the two dimensional (2D) Hubbard model, with parame...
Intrusion Detection in Wireless Sensor Networks: The S-Model Learning Automata Approach
Found in: Wireless and Mobile Computing, Networking and Communication, IEEE International Conference on
By Sudip Misra, Kiran Isaac Abraham, Mohammad S. Obaidat, P. Venkata Krishna
Issue Date:October 2008
pp. 603-607
In this paper, we address the problem of intrusion detection in Wireless Sensor Networks (WSNs) using a Learning Automata (LA)-based approach.??We are not aware of any LA-based intrusion detection systems (IDSs) solutions for WSNs. Additionally, the S-mode...
People?s Participation in Rural Electrification ? A Successful Case
Found in: Emerging Trends in Engineering & Technology, International Conference on
By Kamalapur G D, Udaykumar R Y, Karajgi S
Issue Date:July 2008
pp. 945-949
Rural electrification is an integral component of poverty alleviation and rural growth of a nation. A developing nation, like India has 72.2 percent people living in rural areas. Still, electricity has not played an effective role in the socioeconomic grow...
SPADE: the system s declarative stream processing engine
Found in: Proceedings of the 2008 ACM SIGMOD international conference on Management of data (SIGMOD '08)
By Bugra Gedik, Henrique Andrade, Kun-Lung Wu, Myungcheol Doo, Philip S. Yu
Issue Date:June 2008
pp. 13-14
In this paper, we present Spade - the System S declarative stream processing engine. System S is a large-scale, distributed data stream processing middleware under development at IBM T. J. Watson Research Center. As a front-end for rapid application develo...
Missouri S&T Mote-Based Demonstration of Energy Monitoring Solution for Network Enabled Manufacturing Using Wireless Sensor Networks (WSN)
Found in: International Conference on Information Processing in Sensor Networks
By James W. Fonda, Maciej J. Zawodniok, S. Jagannathan, Al Salour, Donald Miller Jr.
Issue Date:April 2008
pp. 559-560
In this work, an inexpensive electric utilities monitoring solution using wireless sensor networks is demonstrated that can easily be installed, deployed, maintained and eliminate unnecessary energy costs and effort. The monitoring solution is designed to ...
Inclusion of a Montgomery Multiplier Unit into an Embedded Processor?s Datapath to Speed-up Elliptic Curve Cryptography
Found in: Information Assurance and Security, International Symposium on
By S. Bartolini, G. Castagnini, E. Martinelli
Issue Date:August 2007
pp. 95-100
This paper analyzes the effects of including a full-width GF(2^m) Montgomery multiplier within the datapath of an existing embedded processor, aiming to speed-up Elliptic Curve Cryptography (ECC). This approach tends to exploit the tight coupling between t...
Performance of Various Cost Functions in the Search for Strong S-Boxes
Found in: Information Technology, International Conference on
By Anirban Chakraborty, Arnab Chatterjee, S. K. Basu
Issue Date:December 2006
pp. 188-189
We present the results of our search to find the performance of the various spectrum based cost functions and the effect of varying its parameter in the design of strong S-Boxes. It is conjectured that good S-Boxes can be obtained, if the search is made wi...
2.5 Gbit/s PRBS Generator and Checker
Found in: International Symposium ELMAR
By L. Pavlovic, M. Vidmar, S. Tomazic
Issue Date:June 2006
pp. 363-366
A novel approach in the implementation of a high-speed linear-feedback shift register (LFSR) using a single D-flip-flop is presented. A PRBS data generator and checker using discrete-logical devices are presented as an example. Due to the discrete-logical ...
What?s Different: Distributed, Continuous Monitoring of Duplicate-Resilient Aggregates on Data Streams
Found in: Data Engineering, International Conference on
By Graham Cormode, S. Muthukrishnan, Wei Zhuang
Issue Date:April 2006
pp. 57
Emerging applications in sensor systems and network-wide IP traffic analysis present many technical challenges. They need distributed monitoring and continuous tracking of events. They have severe resource constraints not only at each site in terms of per-...
Can Microsoft?s Service Pack2 (SP2) Security Software Prevent SMURF Attacks?
Found in: Advanced International Conference on Telecommunications / Internet and Web Applications and Services, International Conference on
By S. Kumar, M. Azad, O. Gomez, R. Valdez
Issue Date:February 2006
pp. 89
DDoS flooding attacks are quite popular with hackers and they can cause devastating impact on computer systems. Smurf attack is a type of flooding attack that involves ICMP protocol, which is known to have brought down high profile commercial websites. A c...
Stability Analysis in a Transmission Line With Nonlinear Elements Using Lyapunov?s Method
Found in: Electronics, Communications, and Computers, International Conference on
By S. A. Rodriguez, R. J. Rodriguez, J.L. Vazquez Gonzalez
Issue Date:March 2006
pp. 20
<p>This paper shows a basic methodology for an equilibrium points based analysis of a nonlinear electrical systems. The purpose is formulate alternative sufficient and necessary conditions to guarantee local asymptotic stability.</p> <p>E...
Knowledge Management in IT Organizations from Employee?s Perspective
Found in: Hawaii International Conference on System Sciences
By Brent M. Han, Vittal S. Anantatmula
Issue Date:January 2006
pp. 146c
Research has shown that the current knowledge management (KM) approaches do not emphasize enough on knowledge sharing from non-executive employee?s perspective. However, it is important for organizations to understand from employees? perspective the factor...
Radial Basis Neural Network Learning Based on Particle Swarm Optimization to Multistep Prediction of Chaotic Lorenz?s System
Found in: Hybrid Intelligent Systems, International Conference on
By Fabio A. Guerra, Leandro dos S. Coelho
Issue Date:December 2005
pp. 521-523
This paper presents a hybrid training approach to radial basis function neural networks (RBF-NN). It uses clustering methods to tune the centers of the Gaussian functions used in the hidden layer of a RBF-NN. It also uses particle swarm optimization for ce...
Automatic Conversion of MPEG-7 Specification and Data into RDF(S) For Semantic Interoperability in Information Retrieval
Found in: Computational Intelligence for Modelling, Control and Automation, International Conference on
By J. M. Yoo, S. H. Myaeng, S. S. Kim, M. H. Lee
Issue Date:November 2005
pp. 45-50
Interoperability between different metadata schemas and data is an important issue for various semantic web-related applications. The definitions and MPEG-7 data for multimedia content instances can?t be used with other metadata standards in a semantically...
An Improved Categorization of Classifier?s Sensitivity on Sample Selection Bias
Found in: Data Mining, IEEE International Conference on
By Wei Fan, Ian Davidson, Bianca Zadrozny, Philip S. Yu
Issue Date:November 2005
pp. 605-608
A recent paper categorizes classifier learning algorithms according to their sensitivity to a common type of sample selection bias where the chance of an example being selected into the training sample depends on its feature vector x but not (directly) on ...
On Maintaining Multimedia Session?s Quality in CDMA Cellular Networks Using a Rate Adaptive Framework
Found in: Quality of Service in Heterogeneous Wired/Wireless Networks, International Conference on
By Ehab S. Elmallah, Mrinal Mandal
Issue Date:August 2005
pp. 42
<p>In [4] the authors have developed call admission control and adaptive bandwidth allocation schemes for serving multimedia connections in cellular wireless networks with fixed cell capacity. The architecture considers an adaptive networking framewo...
On-Chip Self-Calibration of RF Circuits Using Specification-Driven Built-In Self Test (S-BIST)
Found in: On-Line Testing Symposium, IEEE International
By Donghoon Han, Selim Sermet Akbay, S. Bhattacharya, A. Chatterjee, William R. Eisenstadt
Issue Date:July 2005
pp. 106-111
In the nanometer design regime, analog and RF circuits are expected to be increasingly susceptible to process, noise and thermal variations. Shifting threshold voltages on the NMOS and PMOS devices of a mixer, LNA or power amplifier, for example, can affec...
The automated approach to the mode-matching and S-matrix techniques: from idea to realization
Found in: International Conference on Antenna Theory and Techniques
By A. Kirilenko, D. Kulik, L. Rud, S. Kulishenko, V. Tkachenko
Issue Date:May 2005
pp. 36-41
An attempt of combining the efficiency of problem-oriented numerical algorithms with the generality of mesh methods is made. The automatic procedure of decomposition of complicated waveguide structures is developed. It takes into account peculiarities of t...
Diagnosis of small-signal parameters for broadband amplifiers through S-parameter measurements and sensitivity-guided evolutionary search
Found in: Computer-Aided Design, International Conference on
By Fang Liu, S. Ozev, M. Brooke
Issue Date:November 2004
pp. 641-647
With increasing uncertainties in the modeling and processing of semiconductor devices, it is essential that the sources of failures be identified once the devices are manufactured. We present a methodology to diagnose the problems in broadband amplifiers b...
The Effects of Spatial Resolution on an Automated Diabetic Retinopathy Screening System?s Performance in Detecting Microaneurysms for Diabetic Retinopathy
Found in: Computer-Based Medical Systems, IEEE Symposium on
By B. Raman, E. S. Bursell, M. Wilson, G. Zamora, I. Benche, S. C. Nemeth, P. Soliz
Issue Date:June 2004
pp. 128
This paper presents the effects of image quality, given by the number of pixels used to define the image. A microaneurysm (MA) segmentation algorithm that has been shown to achieve about 90% sensitivity and specificity for clinical classification using hig...
Fully Differential Receiver Chipset for 40 Gb/s Applications Using GaInAs/InP Single Heterojunction Bipolar Transistors
Found in: Computer Design, International Conference on
By K. Kiziloglu, S. Seetharaman, K.W. Glass, C. Bil, H.V. Duong, G. Asmanis
Issue Date:October 2003
pp. 462
No summary available.
FLOW: Co-Constructing Low Barrier Repository Infrastructure in Support of Heterogeneous Knowledge Collection(s)
Found in: Digital Libraries, Joint Conference on
By Karen S. Baker, Anna K. Gold, Frank Sudholt
Issue Date:May 2003
pp. 397
No summary available.
Designing System-Level Software Solutions for Open OS ?s on 3g Wireless Handsets
Found in: Design, Automation and Test in Europe Conference and Exhibition
By S. Glaeson, E. Petit
Issue Date:March 2003
pp. 20040
No summary available.
Analyzing Quality of Service of GPRS Network Systems from a User?s Perspective
Found in: Computers and Communications, IEEE Symposium on
By S. Porcarelli, F. Di Giandomenico, A. Bondavalli
Issue Date:July 2002
pp. 142
With reference to the General Packet Radio Service (GPRS), an extension of the Global System Mobile Communication (GSM) addressing packet-oriented traffic, this paper contributes to the analysis on the service accomplishment level perceived by GPRS users. ...
Two Formal Analys s of Attack Graphs
Found in: Computer Security Foundations Workshop, IEEE
By S. Jha, O. Sheyner, J. Wing
Issue Date:June 2002
pp. 49
<p>An attack graph is a succinct representation of all paths through a system that end in a state where an intruder has successfully achieved his goal. Today Red Teams determine the vulnerability of networked systems by drawing gigantic attack graphs...
Improvement of Metric Accuracy of Digital 3D Models through Digital Photogrammetry. A Case Study: Donatello?s Maddalena
Found in: 3D Data Processing Visualization and Transmission, International Symposium on
By J.-A. Beraldin, G. Guidi, S. Ciofi, C. Atzeni
Issue Date:June 2002
pp. 758
In spite of an undoubted richness of information produced by 3D optical technologies, in some cases, the method for generating a digital model from single 3D acquisitions involves the propagation of errors. These errors limit the overall metric accuracy at...
DL-COTF: an XML based digital library for U. S. Navy's operational test and evaluation force
Found in: Proceedings of the 2002 ACM symposium on Applied computing (SAC '02)
By A. Mathur, Kurt Maly, Mohammad Zubair, S. Balusani, S. Sudeep, W. Wolters
Issue Date:March 2002
pp. 493-497
This paper describes the development of the XML based digital library (DL-COTF) for the United States Navy's operational test and evaluation command (COMOPTEVFOR). COMOPTEVOR tests new systems (weapons, ships, aircraft, etc.) that industry develops and dep...
RHiNET-3/SW: An 80-Gbit/s High-Speed Network Switch for Distributed Parallel Computing
Found in: High-Performance Interconnects, Symposium on
By S. Nishimura, T. Kudoh, H. Nishi, J. Yamamoto, R. Ueno, H. Amano, K. Harasawa, S. Fukuda, Y. Shikichi, S. Akutsu, K. Yasho
Issue Date:August 2001
pp. 0119
Abstract: We have developed a prototype network switch, RHiNET-3/SW, for a RHiNET high-performance distributed parallel computing environment. It has eight I/O ports and each port provides high-speed, bi-directional 10-Gbit/s-per-port parallel optic data t...
Discovering Common of Structural Motifs from SSU 16 S Ribosomal RNA Secondary Structures
Found in: Bioinformatic and Bioengineering, IEEE International Symposium on
By H.-D. Huang, S.-F. Fang, J.-T. Horng, C.-Y. Kao
Issue Date:March 2001
pp. 104
Some structural motifs, like tetra-loops, in ribosomal RNA are known to functionally implicate in virtually every aspect of protein synthesis. Our aim in this study is to discover common structural motifs (CSMs), which are related to specific domain or fun...
Code simulation concept for S/390 processors using an emulation system
Found in: High-Level Design, Validation, and Test Workshop, IEEE International
By S. Koerner
Issue Date:November 2000
pp. 101
An innovative simulation concept has been developed for the IBM S/390 system of the year 2000 in the area of microcode verification. The goal is to achieve a long-term improvement in the quality of the delivered microcode, detecting and solving the vast ma...
Portable Petaflop/S Programming: Applying Distributed Computing Methodology to the Grid Within a Single Machine Room
Found in: High-Performance Distributed Computing, International Symposium on
By Paul R. Woodward, S. E. Anderson
Issue Date:August 1999
pp. 9
The Petaflop/s Programming Challenge According to today's best projections, petaflop/s computing platforms will combine deep memory hierarchies in both latency and bandwidth with a need for many-thousand-fold parallelism. Initial users of these systems wil...
IBM's S/390 G5 Microprocessor Design
Found in: IEEE Micro
By Timothy J. Slegel, Robert M. Averill III, Mark A. Check, Bruce C. Giamei, Barry W. Krumm, Christopher A. Krygowski, Wen H. Li, John S. Liptay, John D. MacDougall, Thomas J. McPherson, Jennifer A. Navarro, Eric M. Schwarz, Kevin Shum, Charles F. Webb
Issue Date:March 1999
pp. 12-23
The S/390 G5, the latest generation IBM mainframe system, more than doubles the performance of its predecessor. The microprocessor used in the system is a sophisticated CISC processor that features a large cache and a very high clock frequency to achieve e...
A 4 kb/s toll quality harmonic excitation linear predictive speech coder
Found in: Acoustics, Speech, and Signal Processing, IEEE International Conference on
By S. Yeldener
Issue Date:March 1999
pp. 481-484
The harmonic excitation linear predictive speech coder (HE-LPC) is a technique derived from MBE and MB-LPC type of speech coding algorithms. The HE-LPC coder has the potential of producing high quality speech at 4.8 kb/s and below. This coder employs a new...
A Fully Pipelined, 700MBytes/s DES Encryption Core
Found in: Great Lakes Symposium on VLSI
By Ihn Kim, Craig S. Steele, Jefferey G. Koller
Issue Date:March 1999
pp. 386
Fully-pipelined, 56-bit DES de/encryption and authentication at memory-bus bandwidths is now feasible. We describe a custom, 7 square mm, 120mW core in 4- metal 0.35mm CMOS. Performance allows on-the-fly encryption of 64-bit, 66MHz PCI traffic, and hence t...
A 6.1 to 13.3-kb/s variable rate CELP codec (VR-CELP) for AMR speech coding
Found in: Acoustics, Speech, and Signal Processing, IEEE International Conference on
By S. Heinen, M. Adratm, O. Steil, P. Vary, W. Xu
Issue Date:March 1999
pp. 9-12
We propose a new 6.1 to 13.3-kb/s speech codec called variable rate code-excited linear prediction (VR-CELP) for adaptive multi-rate (AMR) transmission over mobile radio channels such as GSM or UMTS. The AMR concept allows to operate with almost wireline s...
Design methodology for the high-performance G4 S/390 microprocessor
Found in: Computer Design, International Conference on
By K.L. Shepard, S. Carey, D.K. Beece, R. Hatch, G. Northrop
Issue Date:October 1997
pp. 232
This paper describes the methodology employed in the design of the G4 S/390 microprocessor. Issues of verifying design metrics of power, noise, timing, and functional correctness are discussed within the context of a performance-driven transistor-level cus...
A Lattice Low Delay Code Excited Linear Prediction Speech Coder at 16 kb/s
Found in: Computers and Communications, IEEE Symposium on
By S. H. El-Ramly, R. El-kouatly, M. N. Saleh
Issue Date:July 1997
pp. 184
This paper present a lattice low-delay code0excited linear prediction speech coder LLD-CELP based on analysis-by-synthesis configuration. The coder achieves a one-way coding delay of less than 2 ms by making both LPC predictor and the excitation vector siz...
Recent Improvements on Microsoft' s Trainable Text-to-Speech System -Whistler
Found in: Acoustics, Speech, and Signal Processing, IEEE International Conference on
By X. Huang, A. Acero, H. Hon, Y. Ju, J. Liu, S. Meredith, M. Plumpe
Issue Date:April 1997
pp. 959
No summary available.
LH*s: a high-availability and high-security scalable distributed data structure
Found in: Research Issues in Data Engineering, International Workshop on
By W. Litwin, M.-A. Neimat, G. Lev, S. Ndiaye, T. Seck
Issue Date:April 1997
pp. 141
LH*s is high availability variant of LH*, a Scalable Distributed Data Structure. An LH*s record is striped onto different server nodes. A parity segment allows one to reconstruct the record if a segment fails. The insert or key search time is about a msec ...
 1  2 Next >>