Reconfigurable computing architectures

R Tessier, K Pocek, A DeHon - Proceedings of the IEEE, 2015 - ieeexplore.ieee.org
Reconfigurable architectures can bring unique capabilities to computational tasks. They
offer the performance and energy efficiency of hardware with the flexibility of software. In …

Support vector regression and classification based multi-view face detection and recognition

Y Li, S Gong, H Liddell - Proceedings Fourth IEEE International …, 2000 - ieeexplore.ieee.org
A support vector machine-based multi-view face detection and recognition framework is
described. Face detection is carried out by constructing several detectors, each of them in …

Fast and scalable pattern matching for network intrusion detection systems

S Dharmapurikar, JW Lockwood - IEEE Journal on Selected …, 2006 - ieeexplore.ieee.org
High-speed packet content inspection and filtering devices rely on a fast multipattern
matching algorithm which is used to detect predefined keywords or signatures in the …

Generating a hierarchical data structure associated with a plurality of known arbitrary-length bit strings used for detecting whether an arbitrary-length bit string input …

NS Artan, HJ Chao - US Patent 7,805,460, 2010 - Google Patents
Generating and using a high-speed, scalable, and easily updateable data structure are
described. The proposed data structure provides minimal perfect hashing functionality while …

High-performance context-free parser for polymorphic malware detection

YH Cho, WH Mangione-Smith - US Patent App. 11/918,592, 2009 - Google Patents
The invention provides a method and apparatus for advanced network intrusion detection.
The system uses deep packet inspection that can recognize languages described by context …

Fast and scalable pattern matching for content filtering

S Dharmapurikar, J Lockwood - … of the 2005 ACM symposium on …, 2005 - dl.acm.org
High-speed packet content inspection and filtering devices rely on a fast multi-pattern
matching algorithm which is used to detect predefined keywords or signatures in the …

A memory efficient multiple pattern matching architecture for network security

T Song, W Zhang, D Wang… - IEEE INFOCOM 2008-The …, 2008 - ieeexplore.ieee.org
Pattern matching is one of the most important components for the content inspection based
applications of network security, and it requires well designed algorithms and architectures …

Adaptive gray level run length features from class distance matrices

F Albregtsen, B Nielsen… - … Conference on Pattern …, 2000 - ieeexplore.ieee.org
We constructed class distance matrices for the gray level run length texture analysis method.
For a four-class problem of liver cell nuclei, we found that there exist areas of consistently …

A memory-efficient parallel string matching architecture for high-speed intrusion detection

H Lu, K Zheng, B Liu, X Zhang… - IEEE Journal on Selected …, 2006 - ieeexplore.ieee.org
The ability to inspect both packet headers and payloads to identify attack signatures makes
network intrusion detection system (NIDS) a promising approach to protect Internet systems …

[PDF][PDF] 多模式匹配算法及硬件实现

李伟男[1, 鄂跃鹏[1, 葛敬国, 钱华林 - 2006 - jos.org.cn
介绍了多模式匹配的算法和硬件实现方法. 首先介绍了两种常用的多模式匹配算法——Aho-
Corasick 基于自动机的算法和Wu-Manber 基于hash 的后缀匹配加移位跳跃的算法以及相关的 …