Sciweavers

383 search results - page 34 / 77
» The Study of 3D-from-2D Using Elimination
Sort
View
SP
2009
IEEE
143views Security Privacy» more  SP 2009»
14 years 4 months ago
Practical Mitigations for Timing-Based Side-Channel Attacks on Modern x86 Processors
—This paper studies and evaluates the extent to which automated compiler techniques can defend against timing-based side-channel attacks on modern x86 processors. We study how mo...
Bart Coppens, Ingrid Verbauwhede, Koen De Bosscher...
ISCC
2007
IEEE
109views Communications» more  ISCC 2007»
14 years 4 months ago
Embeddable Overlay Networks
—The accuracy of network coordinate (NC) which is comprehensively applied is suffering seriously from Triangle Inequality Violations (TIVs). A novel approach - Embeddable Overlay...
Eng Keong Lua, Timothy G. Griffin
VLDB
2007
ACM
204views Database» more  VLDB 2007»
14 years 4 months ago
Optimization of Frequent Itemset Mining on Multiple-Core Processor
Multi-core processors are proliferated across different domains in recent years. In this paper, we study the performance of frequent pattern mining on a modern multi-core machine....
Eric Li, Li Liu
ISCA
2005
IEEE
81views Hardware» more  ISCA 2005»
14 years 3 months ago
The Impact of Performance Asymmetry in Emerging Multicore Architectures
Performance asymmetry in multicore architectures arises when individual cores have different performance. Building such multicore processors is desirable because many simple cores...
Saisanthosh Balakrishnan, Ravi Rajwar, Michael Upt...
MSWIM
2003
ACM
14 years 3 months ago
Impact of location inconsistencies on geographic routing in wireless networks
Recently, geographic routing in wireless networks has gained attention due to several advantages of location information. Location information eliminates the necessity to set up a...
Yongjin Kim, Jae-Joon Lee, Ahmed Helmy