Sciweavers

43 search results - page 3 / 9
» Realizing the full potential of PSM using proxying
Sort
View
ICCAD
2004
IEEE
180views Hardware» more  ICCAD 2004»
14 years 2 months ago
Physical placement driven by sequential timing analysis
Traditional timing-driven placement considers only combinational delays and does not take into account the potential of subsequent sequential optimization steps. As a result, the ...
Aaron P. Hurst, Philip Chong, Andreas Kuehlmann
NDSS
2008
IEEE
13 years 11 months ago
Analysis-Resistant Malware
Traditionally, techniques for computing on encrypted data have been proposed with privacy preserving applications in mind. Several current cryptosystems support a homomorphic oper...
John Bethencourt, Dawn Song, Brent Waters
ATAL
1999
Springer
13 years 9 months ago
Toward Team-Oriented Programming
Abstract. The promise of agent-based systems is leading towards the development of autonomous, heterogeneous agents, designed by a variety of research/industrial groups and distrib...
David V. Pynadath, Milind Tambe, Nicolas Chauvat, ...
TON
2008
138views more  TON 2008»
13 years 5 months ago
On the performance benefits of multihoming route control
Multihoming is increasingly being employed by large enterprises and data centers to extract good performance and reliability from their ISP connections. Multihomed end networks tod...
Aditya Akella, Bruce M. Maggs, Srinivasan Seshan, ...
CCS
2010
ACM
13 years 5 months ago
Hierarchical attribute-based encryption for fine-grained access control in cloud storage services
Cloud computing, as an emerging computing paradigm, enables users to remotely store their data into a cloud so as to enjoy scalable services on-demand. Especially for small and me...
Guojun Wang, Qin Liu, Jie Wu