Zobrazeno 1 - 7
of 7
pro vyhledávání: '"Chen-Hsiung Liu"'
Autor:
Chen-Hsiung Liu, 劉臣雄
105
This study aimed to investigate the effectiveness of the integration of technology information into nature and science technology teaching on the third graders’ learning achievement, learning retention, and their perceptions on multimedia
This study aimed to investigate the effectiveness of the integration of technology information into nature and science technology teaching on the third graders’ learning achievement, learning retention, and their perceptions on multimedia
Externí odkaz:
http://ndltd.ncl.edu.tw/handle/pc6562
Publikováno v:
IEEE Transactions on Parallel and Distributed Systems. 28:2639-2650
Multiple string matching has a wide range of applications such as network intrusion detection systems, spam filters, information retrieval systems, and bioinformatics. To accelerate multiple string matching, many hardware approaches are proposed to a
Publikováno v:
IEEE Transactions on Computers. 62:1906-1916
Graphics processing units (GPUs) have attracted a lot of attention due to their cost-effective and enormous power for massive data parallel computing. In this paper, we propose a novel parallel algorithm for exact pattern matching on GPUs. A traditio
Autor:
Chen-Hsiung Liu, P. Pan
Publikováno v:
IEEE Transactions on Computers. 48:1000-1005
This paper deals with partial scan approaches that select scan signals oblivious to the availability of flip-flops (FFs). Such approaches can greatly reduce the number of scan signals since maximum freedom is presented when selecting signals. However
Publikováno v:
INFOCOM
Memory architectures have been widely adopted in network intrusion detection system for inspecting malicious packets due to their flexibility and scalability. Memory architectures match input streams against thousands of attack patterns by traversing
Publikováno v:
GLOBECOM
Network Intrusion Detection System has been widely used to protect computer systems from network attacks. Due to the ever-increasing number of attacks and network complexity, traditional software approaches on uni-processors have become inadequate fo
Publikováno v:
2010 IEEE Global Telecommunications Conference (GLOBECOM 2010); 2010, p1-5, 5p