Sciweavers

175 search results - page 32 / 35
» Approximation Algorithms for Key Management in Secure Multic...
Sort
View
ISCA
2007
IEEE
167views Hardware» more  ISCA 2007»
15 years 3 months ago
New cache designs for thwarting software cache-based side channel attacks
Software cache-based side channel attacks are a serious new class of threats for computers. Unlike physical side channel attacks that mostly target embedded cryptographic devices,...
Zhenghong Wang, Ruby B. Lee
IEEEPACT
2006
IEEE
15 years 3 months ago
A low-cost memory remapping scheme for address bus protection
The address sequence on the processor-memory bus can reveal abundant information about the control flow of a program. This can lead to critical information leakage such as encryp...
Lan Gao, Jun Yang 0002, Marek Chrobak, Youtao Zhan...
ICIP
2006
IEEE
15 years 11 months ago
Perceptual Feature Selection for Semantic Image Classification
Content-based image retrieval has become an indispensable tool for managing the rapidly growing collections of digital images. The goal is to organize the contents semantically, a...
Dejan Depalov, Thrasyvoulos N. Pappas, Dongge Li, ...
86
Voted
ASC
2006
14 years 11 months ago
A WAM implementation for flexible query answering
In [7] Maria I. Sessa extended the SLD resolution principle with the ability of performing approximate reasoning and flexible query answering. The operational mechanism of similar...
Pascual Julián Iranzo, Clemente Rubio-Manza...
65
Voted
MP
2008
135views more  MP 2008»
14 years 9 months ago
A path to the Arrow-Debreu competitive market equilibrium
: We present polynomial-time interior-point algorithms for solving the Fisher and Arrow-Debreu competitive market equilibrium problems with linear utilities and n players. Both of ...
Yinyu Ye