Sciweavers

1369 search results - page 168 / 274
» A Practical Implementation of the Timing Attack
Sort
View
ASPLOS
2006
ACM
15 years 5 months ago
Temporal search: detecting hidden malware timebombs with virtual machines
Worms, viruses, and other malware can be ticking bombs counting down to a specific time, when they might, for example, delete files or download new instructions from a public we...
Jedidiah R. Crandall, Gary Wassermann, Daniela A. ...
ICDCS
2011
IEEE
13 years 10 months ago
Competitive and Fair Medium Access Despite Reactive Jamming
Abstract—Intentional interference constitutes a major threat for communication networks operating over a shared medium where availability is imperative. Jamming attacks are often...
Andréa W. Richa, Christian Scheideler, Stef...
AGILEDC
2009
IEEE
15 years 6 months ago
Fully Distributed Scrum: Linear Scalability of Production between San Francisco and India
—The Scrum software development framework was designed for the hyperproductive state where productivity increases by 5-10 times over waterfall teams and many colocated teams have...
Jeff Sutherland, Guido Schoonheim, N. Kumar, V. Pa...
IPPS
2006
IEEE
15 years 5 months ago
MPEG-2 decoding in a stream programming language
Image and video codecs are prevalent in multimedia devices, ranging from embedded systems, to desktop computers, to high-end servers such as HDTV editing consoles. It is not uncom...
M. Drake, Henry Hoffmann, Rodric M. Rabbah, Saman ...
SARA
2009
Springer
15 years 3 months ago
Light Algorithms for Maintaining Max-RPC During Search
Abstract. This article presents two new algorithms whose purpose is to maintain the Max-RPC domain filtering consistency during search with a minimal memory footprint and implemen...
Julien Vion, Romuald Debruyne