Sciweavers

3628 search results - page 99 / 726
» Approaching the Physical Limits of Computing
Sort
View
CHES
2000
Springer
135views Cryptology» more  CHES 2000»
14 years 1 months ago
Differential Power Analysis in the Presence of Hardware Countermeasures
Abstract. The silicon industry has lately been focusing on side channel attacks, that is attacks that exploit information that leaks from the physical devices. Although different c...
Christophe Clavier, Jean-Sébastien Coron, N...
ASPLOS
2008
ACM
14 years 1 days ago
Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems
Commodity operating systems entrusted with securing sensitive data are remarkably large and complex, and consequently, frequently prone to compromise. To address this limitation, ...
Xiaoxin Chen, Tal Garfinkel, E. Christopher Lewis,...
USENIX
1994
13 years 11 months ago
Reducing File System Latency using a Predictive Approach
Despite impressive advances in file system throughput resulting from technologies such as high-bandwidth networks and disk arrays, file system latency has not improved and in many...
Jim Griffioen, Randy Appleton
CCGRID
2003
IEEE
14 years 3 months ago
An Exposed Approach to Reliable Multicast in Heterogeneous Logistical Networks
An exposed approach in computer service architecture is one that offers client software a primitive service whose semantics are closely based on the underlying physical infrastruc...
Micah Beck, Ying Ding 0002, Erika Fuentes, Sharmil...
SEMCO
2007
IEEE
14 years 4 months ago
Corpus-based Pattern Induction for a Knowledge-based Question Answering Approach
In this paper, we present an approach which, given a knowledge base and an appropriate text corpus, automatically induces patterns which can be used to query the knowledge base. W...
Philipp Cimiano, Michael Erdmann, Günter Ladw...