Sciweavers

383 search results - page 68 / 77
» Quantitative Evaluation in Embedded System Design: Trends in...
Sort
View
ICPADS
1994
IEEE
14 years 4 days ago
Stochastic Modeling of Scaled Parallel Programs
Testingthe performance scalabilityof parallelprograms can be a time consuming task, involving many performance runs for different computer configurations, processor numbers, and p...
Allen D. Malony, Vassilis Mertsiotakis, Andreas Qu...
ESORICS
2007
Springer
14 years 2 months ago
SilentKnock: Practical, Provably Undetectable Authentication
Port knocking is a technique first introduced in the blackhat and trade literature to prevent attackers from discovering and exploiting potentially vulnerable services on a networ...
Eugene Y. Vasserman, Nicholas Hopper, John Laxson,...
SIGMOD
2012
ACM
220views Database» more  SIGMOD 2012»
11 years 10 months ago
GUPT: privacy preserving data analysis made easy
It is often highly valuable for organizations to have their data analyzed by external agents. However, any program that computes on potentially sensitive data risks leaking inform...
Prashanth Mohan, Abhradeep Thakurta, Elaine Shi, D...
MOBISYS
2010
ACM
13 years 10 months ago
Darwin phones: the evolution of sensing and inference on mobile phones
We present Darwin, an enabling technology for mobile phone sensing that combines collaborative sensing and classification techniques to reason about human behavior and context on ...
Emiliano Miluzzo, Cory Cornelius, Ashwin Ramaswamy...
EMSOFT
2007
Springer
14 years 2 months ago
Scheduling multiple independent hard-real-time jobs on a heterogeneous multiprocessor
This paper proposes a scheduling strategy and an automatic scheduling flow that enable the simultaneous execution of multiple hard-real-time dataflow jobs. Each job has its own ...
Orlando Moreira, Frederico Valente, Marco Bekooij