Sciweavers

282 search results - page 28 / 57
» The Design and Implementation of the Inversion File System
Sort
View
ICCD
2008
IEEE
142views Hardware» more  ICCD 2008»
14 years 4 months ago
Making register file resistant to power analysis attacks
— Power analysis attacks are a type of side-channel attacks that exploits the power consumption of computing devices to retrieve secret information. They are very effective in br...
Shuo Wang, Fan Zhang, Jianwei Dai, Lei Wang, Zhiji...
CCS
2007
ACM
14 years 1 months ago
Pors: proofs of retrievability for large files
In this paper, we define and explore proofs of retrievability (PORs). A POR scheme enables an archive or back-up service (prover) to produce a concise proof that a user (verifier...
Ari Juels, Burton S. Kaliski Jr.
HICSS
1999
IEEE
97views Biometrics» more  HICSS 1999»
14 years 1 days ago
The Ragnarok Architectural Software Configuration Management Model
The architecture is the fundamental framework for designing and implementing large scale software, and the ability to trace and control its evolution is essential. However, many t...
Henrik Bærbak Christensen
ICCS
2003
Springer
14 years 28 days ago
Terascale I/O Solutions
PSC has architected and delivered the TCS-1 machine, a Terascale Computing System for use in unclassified research. PSC has enhanced the effective usability and utilization of this...
Nathan Stone, John Kochmar, Paul Nowoczynski, J. R...
COMCOM
1998
83views more  COMCOM 1998»
13 years 7 months ago
The design of the TAO real-time object request broker
Many real-time application domains can benefit from flexible and open distributed architectures, such as those defined by the CORBA specification. CORBA is an architecture for...
Douglas C. Schmidt, David L. Levine, Sumedh Mungee