Sciweavers

474 search results - page 60 / 95
» Empirical Evaluation of Techniques for Measuring Available B...
Sort
View
CHES
2006
Springer
87views Cryptology» more  CHES 2006»
14 years 2 months ago
Templates vs. Stochastic Methods
Template Attacks and the Stochastic Model provide advanced methods for side channel cryptanalysis that make use of `a-priori' knowledge gained from a profiling step. For a sys...
Benedikt Gierlichs, Kerstin Lemke-Rust, Christof P...
IPPS
2010
IEEE
13 years 8 months ago
Distributed monitoring of conditional entropy for anomaly detection in streams
In this work we consider the problem of monitoring information streams for anomalies in a scalable and efficient manner. We study the problem in the context of network streams wher...
Chrisil Arackaparambil, Sergey Bratus, Joshua Brod...
EUROSYS
2007
ACM
14 years 7 months ago
STMBench7: a benchmark for software transactional memory
Software transactional memory (STM) is a promising technique for controlling concurrency in modern multi-processor architectures. STM aims to be more scalable than explicit coarse...
Rachid Guerraoui, Michal Kapalka, Jan Vitek
OSDI
2006
ACM
14 years 11 months ago
iPlane: An Information Plane for Distributed Services
In this paper, we present the design, implementation, and evaluation of iPlane, a scalable service providing accurate predictions of Internet path performance for emerging overlay...
Harsha V. Madhyastha, Tomas Isdal, Michael Piatek,...
ICCCN
2008
IEEE
14 years 5 months ago
Improving Load Balancing with Multipath Routing
— Internet service providers have to provision network resources to optimize bandwidth utilization. Dynamic routing protocols take traffic variations into account to control the...
Pascal Mérindol, Jean-Jacques Pansiot, St&e...