Sciweavers

1369 search results - page 240 / 274
» A Practical Implementation of the Timing Attack
Sort
View
ACMMSP
2006
ACM
226views Hardware» more  ACMMSP 2006»
15 years 2 months ago
Smarter garbage collection with simplifiers
We introduce a method for providing lightweight daemons, called simplifiers, that attach themselves to program data. If a data item has a simplifier, the simplifier may be run aut...
Melissa E. O'Neill, F. Warren Burton
CORR
2010
Springer
164views Education» more  CORR 2010»
14 years 11 months ago
Sub-Nyquist Sampling of Short Pulses: Part I
We develop sub-Nyquist sampling systems for analog signals comprised of several, possibly overlapping, finite duration pulses with unknown shapes and time positions. Efficient sam...
Ewa Matusiak, Yonina C. Eldar
CORR
2007
Springer
90views Education» more  CORR 2007»
14 years 10 months ago
Discrete Denoising with Shifts
We introduce S-DUDE, a new algorithm for denoising Discrete Memoryless Channel (DMC)-corrupted data. The algorithm, which generalizes the recently introduced DUDE (Discrete Univer...
Taesup Moon, Tsachy Weissman
SAC
2002
ACM
14 years 10 months ago
Option pricing under model and parameter uncertainty using predictive densities
The theoretical price of a financial option is given by the expectation of its discounted expiry time payoff. The computation of this expectation depends on the density of the val...
F. Oliver Bunnin, Yike Guo, Yuhe Ren
HPCA
2006
IEEE
15 years 11 months ago
Completely verifying memory consistency of test program executions
An important means of validating the design of commercial-grade shared memory multiprocessors is to run a large number of pseudo-random test programs on them. However, when intent...
Chaiyasit Manovit, Sudheendra Hangal