Sciweavers

1560 search results - page 42 / 312
» Broadcasting with Side Information
Sort
View
90
Voted
DRM
2009
Springer
15 years 7 months ago
Videosurveillance and privacy: covering the two sides of the mirror with DRM
Privacy and security have always been key concerns for individuals. They have also been closely related concepts: in order to increase their perception of security, people sacriï¬...
Juan Ramón Troncoso-Pastoriza, Pedro Comesa...
93
Voted
EUROPAR
2005
Springer
15 years 6 months ago
Event-Based Measurement and Analysis of One-Sided Communication
Abstract. To analyze the correctness and the performance of a program, information about the dynamic behavior of all participating processes is needed. The dynamic behavior can be ...
Marc-André Hermanns, Bernd Mohr, Felix Wolf
129
Voted
ACNS
2009
Springer
150views Cryptology» more  ACNS 2009»
15 years 4 months ago
How to Compare Profiled Side-Channel Attacks?
Side-channel attacks are an important class of attacks against cryptographic devices and profiled side-channel attacks are the most powerful type of side-channel attacks. In this s...
François-Xavier Standaert, François ...
EUROPAR
2006
Springer
15 years 4 months ago
Specification of Inefficiency Patterns for MPI-2 One-Sided Communication
Abstract. Automatic performance analysis of parallel programs can be accomplished by scanning event traces of program execution for patterns representing inefficient behavior. The ...
Andrej Kühnal, Marc-André Hermanns, Be...
103
Voted
CC
2001
Springer
15 years 4 months ago
Points-to and Side-Effect Analyses for Programs Built with Precompiled Libraries
Large programs are typically built from separate modules. Traditional whole-program analysis cannot be used in the context of such modular development. In this paper we consider an...
Atanas Rountev, Barbara G. Ryder