Sciweavers

878 search results - page 128 / 176
» A Compiler-Based Approach to Data Security
Sort
View
118
Voted
MOC
2010
14 years 10 months ago
The structure of balanced multivariate biorthogonal multiwavelets and dual multiframelets
Abstract. Multiwavelets and multiframelets are of interest in several applications such as numerical algorithms and signal processing, due to their desirable properties such as hig...
Bin Han
148
Voted
ISCA
2012
IEEE
212views Hardware» more  ISCA 2012»
13 years 6 months ago
TimeWarp: Rethinking timekeeping and performance monitoring mechanisms to mitigate side-channel attacks
Over the past two decades, several microarchitectural side channels have been exploited to create sophisticated security attacks. Solutions to this problem have mainly focused on ...
Robert Martin, John Demme, Simha Sethumadhavan
158
Voted
EDBT
2012
ACM
225views Database» more  EDBT 2012»
13 years 5 months ago
Differentially private search log sanitization with optimal output utility
Web search logs contain extremely sensitive data, as evidenced by the recent AOL incident. However, storing and analyzing search logs can be very useful for many purposes (i.e. in...
Yuan Hong, Jaideep Vaidya, Haibing Lu, Mingrui Wu
107
Voted
OSDI
2004
ACM
16 years 3 months ago
Life or Death at Block-Level
A fundamental piece of information required in intelligent storage systems is the liveness of data. We formalize the notion of liveness within storage, and present two classes of ...
Muthian Sivathanu, Lakshmi N. Bairavasundaram, And...
124
Voted
BROADNETS
2007
IEEE
15 years 9 months ago
Computer worm ecology in encounter-based networks
Abstract— Encounter-based network is a frequentlydisconnected wireless ad-hoc network requiring immediate neighbors to store and forward aggregated data for information dissemina...
Sapon Tanachaiwiwat, Ahmed Helmy