Sciweavers

2902 search results - page 514 / 581
» The TheaterLoc Virtual Application
Sort
View
CTRSA
2006
Springer
146views Cryptology» more  CTRSA 2006»
14 years 2 months ago
Cache Attacks and Countermeasures: The Case of AES
We describe several software side-channel attacks based on inter-process leakage through the state of the CPU's memory cache. This leakage reveals memory access patterns, whic...
Dag Arne Osvik, Adi Shamir, Eran Tromer
ESORICS
2006
Springer
14 years 2 months ago
Finding Peer-to-Peer File-Sharing Using Coarse Network Behaviors
A user who wants to use a service forbidden by their site's usage policy can masquerade their packets in order to evade detection. One masquerade technique sends prohibited tr...
Michael P. Collins, Michael K. Reiter
ESWS
2006
Springer
14 years 2 months ago
Semantic Network Analysis of Ontologies
A key argument for modeling knowledge in ontologies is the easy re-use and re-engineering of the knowledge. However, beside consistency checking, current ontology engineering tools...
Bettina Hoser, Andreas Hotho, Robert Jäschke,...
DEXA
2000
Springer
165views Database» more  DEXA 2000»
14 years 1 months ago
DIMS: Implementation of a Federated Information Management System for PRODNET II
The Esprit project PRODNET II1 (Production Planning and Management in an Extended Enterprise) had as its main objective the development of a reference architecture and a support in...
César Garita, Yasemin Ugur, Anne Frenkel, H...
IWMM
2000
Springer
108views Hardware» more  IWMM 2000»
14 years 1 months ago
Implementing an On-the-Fly Garbage Collector for Java
Java uses garbage collection (GC) for the automatic reclamation of computer memory no longer required by a running application. GC implementations for Java Virtual Machines (JVM) ...
Tamar Domani, Elliot K. Kolodner, Ethan Lewis, Eli...