Sciweavers

1286 search results - page 132 / 258
» A Practical Modelling Notation for Secure Distributed Comput...
Sort
View
EUROCRYPT
2009
Springer
16 years 1 months ago
A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
The fair evaluation and comparison of side-channel attacks and countermeasures has been a long standing open question, limiting further developments in the field. Motivated by this...
François-Xavier Standaert, Moti Yung, Tal M...
116
Voted
ISORC
2008
IEEE
15 years 7 months ago
A Hierarchical Resource Management Scheme Enabled by the TMO Programming Scheme
Abstract: For cost-effective realization of sizable realtime distributed computing application systems, significant advances in resource allocation are in critical needs. An advanc...
K. H. (Kane) Kim, Yuqing Li, Kee-Wook Rim, Eltefaa...
TAMC
2007
Springer
15 years 6 months ago
Improving the Average Delay of Sorting
In previous work we have introduced an average-case measure for the time complexity of Boolean circuits – that is the delay between feeding the input bits into a circuit and the ...
Andreas Jakoby, Maciej Liskiewicz, Rüdiger Re...
105
Voted
KDD
2006
ACM
172views Data Mining» more  KDD 2006»
16 years 1 months ago
Attack detection in time series for recommender systems
Recent research has identified significant vulnerabilities in recommender systems. Shilling attacks, in which attackers introduce biased ratings in order to influence future recom...
Sheng Zhang, Amit Chakrabarti, James Ford, Fillia ...
CHI
2008
ACM
16 years 1 months ago
A user study of policy creation in a flexible access-control system
Significant effort has been invested in developing expressive and flexible access-control languages and systems. However, little has been done to evaluate these systems in practic...
Lujo Bauer, Lorrie Faith Cranor, Robert W. Reeder,...