Login / Signup
Scanning workstation memory for malicious codes using dedicated coprocessors.
Sirish A. Kondi
Yoginder S. Dandass
Published in:
ACM Southeast Regional Conference (2006)
Keyphrases
</>
compute intensive
memory requirements
memory usage
error correction
smart card
main memory
image processing
real time
memory space
limited memory
memory size
scan data
wireless sensor networks
social networks
structured light
computing power
random access
low memory
malicious attacks
malicious behavior
neural network