Sciweavers

492 search results - page 78 / 99
» Performance Monitoring on Networked Virtual Environments
Sort
View
JOC
2010
92views more  JOC 2010»
13 years 3 months ago
Efficient Cache Attacks on AES, and Countermeasures
We describe several software side-channel attacks based on inter-process leakage through the state of the CPU's memory cache. This leakage reveals memory access patterns, whic...
Eran Tromer, Dag Arne Osvik, Adi Shamir
VEE
2005
ACM
149views Virtualization» more  VEE 2005»
14 years 2 months ago
Instrumenting annotated programs
Instrumentation is commonly used to track application behavior: to collect program profiles; to monitor component health and performance; to aid in component testing; and more. P...
Marina Biberstein, Vugranam C. Sreedhar, Bilha Men...
NCA
2005
IEEE
14 years 2 months ago
A Wide Area Network Simulation of Single-Round Group Membership Algorithms
A recent theoretical result proposed Sigma, a novel GM protocol that forms views using a singleround of message exchange. Prior GM protocols have required more rounds in the worst...
Roger Khazan, Sophia Yuditskaya
CORR
2002
Springer
156views Education» more  CORR 2002»
13 years 8 months ago
MPICH-G2: A Grid-Enabled Implementation of the Message Passing Interface
Application development for distributed-computing ``Grids'' can benefit from tools that variously hide or enable application-level management of critical aspects of the ...
Nicholas T. Karonis, Brian R. Toonen, Ian T. Foste...
HAPTICS
2002
IEEE
14 years 1 months ago
Building a Task Language for Segmentation and Recognition of User Input to Cooperative Manipulation Systems
We present the results of using Hidden Markov Models (HMMs) for automatic segmentation and recognition of user motions. Previous work on recognition of user intent with man/machin...
C. Sean Hundtofte, Gregory D. Hager, Allison M. Ok...