Sciweavers

534 search results - page 41 / 107
» One more bit is enough
Sort
View
SACRYPT
2007
Springer
141views Cryptology» more  SACRYPT 2007»
14 years 2 months ago
Analysis of Countermeasures Against Access Driven Cache Attacks on AES
Cache attacks on implementations of cryptographic algorithms have turned out to be very powerful. Progress in processor design, e.g., like hyperthreading, requires to adapt models ...
Johannes Blömer, Volker Krummel
INFOCOM
2002
IEEE
14 years 28 days ago
Exploiting OTDM technology in WDM networks
— Wavelength routed optical networks allow to design a logical topology, comprising lightpaths and routers, which is overlayed on the physical topology, comprising optical fiber...
Marco Mellia, Emilio Leonardi, Marco Feletig, Robe...
INFOCOM
2007
IEEE
14 years 2 months ago
Multiple-Choice Random Network for Server Load Balancing
Abstract—In many networking applications such as file sharing, structured peer-to-peer networks are increasingly used in dynamic situations with fluctuating load, which require...
Ye Xia, Alin Dobra, Seung Chul Han
AIED
2007
Springer
14 years 2 months ago
Can a Polite Intelligent Tutoring System Lead to Improved Learning Outside of the Lab?
In this work we are investigating the learning benefits of e-Learning principles (a) within the context of a web-based intelligent tutor and (b) in the “wild,” that is, in real...
Bruce M. McLaren, Sung-Joo Lim, David Yaron, Kenne...
CONEXT
2006
ACM
14 years 2 months ago
Using forgetful routing to control BGP table size
Running the Border Gateway Protocol (BGP), the Internet’s interdomain routing protocol, consumes a large amount of memory. A BGP-speaking router typically stores one or more rou...
Elliott Karpilovsky, Jennifer Rexford