Sciweavers

134 search results - page 25 / 27
» A performance optimization method by gate sizing using stati...
Sort
View
PET
2005
Springer
13 years 11 months ago
Privacy Vulnerabilities in Encrypted HTTP Streams
Abstract. Encrypting traffic does not prevent an attacker from performing some types of traffic analysis. We present a straightforward traffic analysis attack against encrypted HT...
George Dean Bissias, Marc Liberatore, David Jensen...
EUROSYS
2007
ACM
14 years 2 months ago
Tashkent+: memory-aware load balancing and update filtering in replicated databases
We present a memory-aware load balancing (MALB) technique to dispatch transactions to replicas in a replicated database. Our MALB algorithm exploits knowledge of the working sets ...
Sameh Elnikety, Steven G. Dropsho, Willy Zwaenepoe...
ACMMSP
2005
ACM
101views Hardware» more  ACMMSP 2005»
13 years 11 months ago
Transparent pointer compression for linked data structures
64-bit address spaces are increasingly important for modern applications, but they come at a price: pointers use twice as much memory, reducing the effective cache capacity and m...
Chris Lattner, Vikram S. Adve
NSPW
2003
ACM
13 years 11 months ago
SELF: a transparent security extension for ELF binaries
The ability to analyze and modify binaries is often very useful from a security viewpoint. Security operations one would like to perform on binaries include the ability to extract...
Daniel C. DuVarney, V. N. Venkatakrishnan, Sandeep...
TIP
2008
199views more  TIP 2008»
13 years 5 months ago
Minimal-Bracketing Sets for High-Dynamic-Range Image Capture
Abstract--This paper considers the problem of high-dynamicrange (HDR) image capture using low-dynamic-range (LDR) cameras. We present three different minimal-bracketing algorithms ...
Neil Barakat, A. Nicholas Hone, Thomas E. Darcie