Sciweavers

1369 search results - page 168 / 274
» A Practical Implementation of the Timing Attack
Sort
View
167
Voted
ASPLOS
2006
ACM
15 years 11 months ago
Temporal search: detecting hidden malware timebombs with virtual machines
Worms, viruses, and other malware can be ticking bombs counting down to a specific time, when they might, for example, delete files or download new instructions from a public we...
Jedidiah R. Crandall, Gary Wassermann, Daniela A. ...
185
Voted
ICDCS
2011
IEEE
14 years 5 months ago
Competitive and Fair Medium Access Despite Reactive Jamming
Abstract—Intentional interference constitutes a major threat for communication networks operating over a shared medium where availability is imperative. Jamming attacks are often...
Andréa W. Richa, Christian Scheideler, Stef...
AGILEDC
2009
IEEE
16 years 5 days ago
Fully Distributed Scrum: Linear Scalability of Production between San Francisco and India
—The Scrum software development framework was designed for the hyperproductive state where productivity increases by 5-10 times over waterfall teams and many colocated teams have...
Jeff Sutherland, Guido Schoonheim, N. Kumar, V. Pa...
IPPS
2006
IEEE
15 years 11 months ago
MPEG-2 decoding in a stream programming language
Image and video codecs are prevalent in multimedia devices, ranging from embedded systems, to desktop computers, to high-end servers such as HDTV editing consoles. It is not uncom...
M. Drake, Henry Hoffmann, Rodric M. Rabbah, Saman ...
SARA
2009
Springer
15 years 10 months ago
Light Algorithms for Maintaining Max-RPC During Search
Abstract. This article presents two new algorithms whose purpose is to maintain the Max-RPC domain filtering consistency during search with a minimal memory footprint and implemen...
Julien Vion, Romuald Debruyne