Sciweavers

2168 search results - page 116 / 434
» Using Approximation Hardness to Achieve Dependable Computati...
Sort
View
ACSC
2003
IEEE
15 years 9 months ago
FITS - A Fault Injection Architecture for Time-Triggered Systems
Time-triggered systems require a very high degree of temporal accuracy at critical stages during run time. While many software fault injection environments exist today, none of th...
René Hexel
SC
2005
ACM
15 years 9 months ago
Transformations to Parallel Codes for Communication-Computation Overlap
This paper presents program transformations directed toward improving communication-computation overlap in parallel programs that use MPI’s collective operations. Our transforma...
Anthony Danalis, Ki-Yong Kim, Lori L. Pollock, D. ...
CLOUD
2010
ACM
15 years 9 months ago
Fluxo: a system for internet service programming by non-expert developers
Over the last 10–15 years, our industry has developed and deployed many large-scale Internet services, from e-commerce to social networking sites, all facing common challenges i...
Emre Kiciman, V. Benjamin Livshits, Madanlal Musuv...
CHES
2004
Springer
187views Cryptology» more  CHES 2004»
15 years 9 months ago
A New Attack with Side Channel Leakage During Exponent Recoding Computations
In this paper we propose a new side channel attack, where exponent recodings for public key cryptosystems such as RSA and ECDSA are considered. The known side channel attacks and c...
Yasuyuki Sakai, Kouichi Sakurai
ISADS
2003
IEEE
15 years 9 months ago
An Approach to Developing Information Dissemination Service for Ubiquitous Computing Applications
In many ubiquitous computing (ubicomp) applications, such as smart classrooms, hospitals, construction sites, stadiums, shopping malls, emergency services, law enforcement, conven...
Stephen S. Yau, Sheikh Iqbal Ahamed