Multipliers for floating-point double precision and beyond on FPGAs
FREE-DOWNLOAD S Banescu, F De Dinechin, B Pasca… – ACM SIGARCH …, 2011 – . Truncated multipliers, trading resources for a well-controlled accuracy degradation, are useful building blocks in situations where a full multiplier is not needed. . This tiling technique is shown to adapt to full or truncated multipliers.
Continuous Time Bayesian Network Approach for Intrusion Detection
FREE-DOWNLOAD J Xu – 2010 . The sooner the alert triggers, the less the scope of the destruction is. In the detection phase, the . anomalies at different aggregation levels. Kruegel et al. . 15 Page 30. 2.2.2 HIDS Previous work on detecting intrusions in system call logs can be roughly grouped into two .
Efficient Data Mining Algorithms for Intrusion Detection
FREE-DOWNLOADS Rawat – 2005 . detect intrusive behavior. 4. On-line Analysis of Network Data: The phenomenon of self-similarity is exhibited by . we make use of Kendall Tau distance, which is used in rank aggregation . .