Sciweavers

1816 search results - page 163 / 364
» Trace oblivious computation
Sort
View
WISA
2004
Springer
14 years 3 months ago
Onions Based on Universal Re-encryption - Anonymous Communication Immune Against Repetitive Attack
Abstract. Encapsulating messages in onions is one of the major techniques providing anonymous communication in computer networks. To some extent, it provides security against traf...
Marcin Gomulkiewicz, Marek Klonowski, Miroslaw Kut...
HOTOS
2003
IEEE
14 years 3 months ago
Magpie: Online Modelling and Performance-aware Systems
Understanding the performance of distributed systems requires correlation of thousands of interactions between numerous components — a task best left to a computer. Today’s sy...
Paul Barham, Rebecca Isaacs, Richard Mortier, Dush...
ICPP
2002
IEEE
14 years 3 months ago
Out-of-Order Instruction Fetch Using Multiple Sequencers
Conventional instruction fetch mechanisms fetch contiguous blocks of instructions in each cycle. They are difficult to scale since taken branches make it hard to increase the siz...
Paramjit S. Oberoi, Gurindar S. Sohi
EUROPAR
2009
Springer
14 years 2 months ago
Detailed Performance Analysis Using Coarse Grain Sampling
Performance evaluation tools enable analysts to shed light on how applications behave both from a general point of view and at concrete execution points, but cannot provide detaile...
Harald Servat, Germán Llort, Judit Gimenez,...
EUROPAR
2009
Springer
14 years 2 months ago
Real-Time Issues in Live Migration of Virtual Machines
This paper addresses the issue of how to meet the strict timing constraints of (soft) real-time virtualized applications while the Virtual Machine (VM) hosting them is undergoing a...
Fabio Checconi, Tommaso Cucinotta, Manuel Stein