Sciweavers

5277 search results - page 959 / 1056
» Virtual Audio Systems
Sort
View
CTRSA
2006
Springer
146views Cryptology» more  CTRSA 2006»
14 years 1 months ago
Cache Attacks and Countermeasures: The Case of AES
We describe several software side-channel attacks based on inter-process leakage through the state of the CPU's memory cache. This leakage reveals memory access patterns, whic...
Dag Arne Osvik, Adi Shamir, Eran Tromer
HPDC
2000
IEEE
14 years 1 months ago
Automatic Configuration and Run-time Adaptation of Distributed Applications
Increased platform heterogeneity and varying resource availability in distributed systems motivates the design of resource-aware applications, which ensure a desired performance l...
Fangzhe Chang, Vijay Karamcheti
ITS
2000
Springer
128views Multimedia» more  ITS 2000»
14 years 1 months ago
Active Learner Modelling
Abstract. It is common to think of a "learner model" as a global description of a student's understanding of domain content. We propose a notion of learner model whe...
Gordon I. McCalla, Julita Vassileva, Jim E. Greer,...
IWMM
2000
Springer
137views Hardware» more  IWMM 2000»
14 years 1 months ago
Cycles to Recycle: Garbage Collection on the IA-64
The IA-64, Intel's 64-bit instruction set architecture, exhibits a number of interesting architectural features. Here we consider those features as they relate to supporting ...
Richard L. Hudson, J. Eliot B. Moss, Sreenivas Sub...
NGC
2000
Springer
14 years 1 months ago
Policies for using replica groups and their effectiveness over the Internet
Replication is known to offer high availability in the presence of failures. This paper considers the case of a client making invocations on a group of replicated servers. It iden...
G. Morgan, P. D. Ezilchelvan