Sciweavers

1369 search results - page 263 / 274
» A Practical Implementation of the Timing Attack
Sort
View
ADAEUROPE
2000
Springer
15 years 2 months ago
(True) Polymorphism in SPARK2000
of the Reliant Telco Platform, K. Wiesneth Safety-oriented INTERBUS INTERBUS Safety-, K. Meyer-Graefe Developing a Binding Process for Automated Program Recognition and Fault Local...
Tse-Min Lin, John A. McDermid
MIS
1999
Springer
84views Multimedia» more  MIS 1999»
15 years 2 months ago
Minimizing Bandwidth Requirements for On-Demand Data Delivery
Recent techniques for multicast or broadcast delivery of streaming media can provide immediate service to each client request yet achieve considerable client stream sharing (i.e.,...
Derek L. Eager, Mary K. Vernon, John Zahorjan
VISUALIZATION
1998
IEEE
15 years 2 months ago
Interactive out-of-core isosurface extraction
In this paper, we present a novel out-of-core technique for the interactive computation of isosurfaces from volume data. Our algorithm minimizes the main memory and disk space req...
Yi-Jen Chiang, Cláudio T. Silva, William J....
STOC
1993
ACM
264views Algorithms» more  STOC 1993»
15 years 2 months ago
Contention in shared memory algorithms
Most complexity measures for concurrent algorithms for asynchronous shared-memory architectures focus on process steps and memory consumption. In practice, however, performance of ...
Cynthia Dwork, Maurice Herlihy, Orli Waarts
CCS
2009
ACM
15 years 2 months ago
On lightweight mobile phone application certification
Users have begun downloading an increasingly large number of mobile phone applications in response to advancements in handsets and wireless networks. The increased number of appli...
William Enck, Machigar Ongtang, Patrick Drew McDan...