Sciweavers

976 search results - page 20 / 196
» Evaluating Adversarial Partitions
Sort
View
MASCOTS
2001
13 years 11 months ago
Simulation Evaluation of a Heterogeneous Web Proxy Caching Hierarchy
This paper uses trace-driven simulations to evaluate the performance of different cache management techniques for multi-level Web proxy caching hierarchies. In particular, the exp...
Mudashiru Busari, Carey L. Williamson
ARVLSI
1995
IEEE
124views VLSI» more  ARVLSI 1995»
14 years 1 months ago
An evaluation of bipartitioning techniques
Logic partitioning is an important issue in VLSI CAD, and has been an area of active research for at least the last 25 years. Numerous approaches have been developed and many diff...
Scott Hauck, Gaetano Borriello
GLVLSI
2006
IEEE
124views VLSI» more  GLVLSI 2006»
14 years 3 months ago
Dominator-based partitioning for delay optimization
Most of the logic synthesis algorithms are not scalable for large networks and, for this reason, partitioning is often applied. However traditional mincut-based partitioning techn...
David Bañeres, Jordi Cortadella, Michael Ki...
FC
2007
Springer
147views Cryptology» more  FC 2007»
14 years 1 months ago
Certificate Revocation Using Fine Grained Certificate Space Partitioning
A new certificate revocation system is presented. The basic idea is to divide the certificate space into several partitions, the number of partitions being dependent on the PKI en...
Vipul Goyal
EUROCRYPT
2009
Springer
14 years 10 months ago
A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
The fair evaluation and comparison of side-channel attacks and countermeasures has been a long standing open question, limiting further developments in the field. Motivated by this...
François-Xavier Standaert, Moti Yung, Tal M...