We describe several software side-channel attacks based on inter-process leakage through the state of the CPU's memory cache. This leakage reveals memory access patterns, whic...
Instrumentation is commonly used to track application behavior: to collect program profiles; to monitor component health and performance; to aid in component testing; and more. P...
Marina Biberstein, Vugranam C. Sreedhar, Bilha Men...
A recent theoretical result proposed Sigma, a novel GM protocol that forms views using a singleround of message exchange. Prior GM protocols have required more rounds in the worst...
Application development for distributed-computing ``Grids'' can benefit from tools that variously hide or enable application-level management of critical aspects of the ...
Nicholas T. Karonis, Brian R. Toonen, Ian T. Foste...
We present the results of using Hidden Markov Models (HMMs) for automatic segmentation and recognition of user motions. Previous work on recognition of user intent with man/machin...
C. Sean Hundtofte, Gregory D. Hager, Allison M. Ok...