Sciweavers

1558 search results - page 179 / 312
» Scalable work stealing
Sort
View
WWW
2005
ACM
14 years 12 months ago
Cataclysm: policing extreme overloads in internet applications
In this paper we present the Cataclysm server platform for handling extreme overloads in hosted Internet applications. The primary contribution of our work is to develop a low ove...
Bhuvan Urgaonkar, Prashant J. Shenoy
CHI
2009
ACM
14 years 11 months ago
Exploring the design of accessible goal crossing desktop widgets
Prior work has shown that goal crossing may be a more accessible interaction technique than conventional pointing-and-clicking for motor-impaired users. Although goal crossing wit...
Eun Kyoung Choe, Kristen Shinohara, Parmit K. Chil...
HPCA
2009
IEEE
14 years 11 months ago
Express Cube Topologies for on-Chip Interconnects
Driven by continuing scaling of Moore's law, chip multiprocessors and systems-on-a-chip are expected to grow the core count from dozens today to hundreds in the near future. ...
Boris Grot, Joel Hestness, Stephen W. Keckler, Onu...
CHES
2009
Springer
265views Cryptology» more  CHES 2009»
14 years 11 months ago
Higher-Order Masking and Shuffling for Software Implementations of Block Ciphers
Differential Power Analysis (DPA) is a powerful side channel key recovery attack that efficiently breaks block ciphers implementations. In software, two main techniques are usually...
Matthieu Rivain, Emmanuel Prouff, Julien Doget
KDD
2009
ACM
141views Data Mining» more  KDD 2009»
14 years 11 months ago
Meme-tracking and the dynamics of the news cycle
Tracking new topics, ideas, and "memes" across the Web has been an issue of considerable interest. Recent work has developed methods for tracking topic shifts over long ...
Jure Leskovec, Lars Backstrom, Jon M. Kleinberg