Sciweavers

2493 search results - page 439 / 499
» A survey of network virtualization
Sort
View
JOC
2010
92views more  JOC 2010»
14 years 4 months ago
Efficient Cache Attacks on AES, and Countermeasures
We describe several software side-channel attacks based on inter-process leakage through the state of the CPU's memory cache. This leakage reveals memory access patterns, whic...
Eran Tromer, Dag Arne Osvik, Adi Shamir
FORTE
2011
14 years 1 months ago
A Framework for Verifying Data-Centric Protocols
Abstract. Data centric languages, such as recursive rule based languages, have been proposed to program distributed applications over networks. They simplify greatly the code, whic...
Yuxin Deng, Stéphane Grumbach, Jean-Fran&cc...
IWQOS
2011
Springer
14 years 24 days ago
OLIC: OnLine Information Compression for scalable hosting infrastructure monitoring
—Quality-of-service (QoS) management often requires a continuous monitoring service to provide updated information about different hosts and network links in the managed system. ...
Yongmin Tan, Xiaohui Gu, Vinay Venkatesh
NAR
2011
235views Computer Vision» more  NAR 2011»
14 years 23 days ago
P2CS: a database of prokaryotic two-component systems
P2CS (http://www.p2cs.org) is a specialized database for prokaryotic two-component systems (TCSs), virtually ubiquitous signalling proteins which regulate a wide range of physiolo...
Mohamed Barakat, Philippe Ortet, David E. Whitwort...
ECSCW
2011
13 years 9 months ago
Flypad: Designing Trajectories in a Large-Scale Permanent Augmented Reality Installation
A long-term naturalistic study reveals how artists designed, visitors experienced, and curators and technicians maintained a public interactive artwork over a four year period. The...
Martin Flintham, Stuart Reeves, Patrick Brundell, ...