Sciweavers

54 search results - page 8 / 11
» Cache Based Remote Timing Attack on the AES
Sort
View
90
Voted
ICIP
2008
IEEE
16 years 1 months ago
Low delay streaming of computer graphics
In this paper, we present a graphics streaming system for remote gaming in a local area network. The framework aims at creating a networked game platform for home and hotel enviro...
Peter Eisert, Philipp Fechteler
CHES
2008
Springer
132views Cryptology» more  CHES 2008»
15 years 1 months ago
Light-Weight Instruction Set Extensions for Bit-Sliced Cryptography
Bit-slicing is a non-conventional implementation technique for cryptographic software where an n-bit processor is considered as a collection of n 1-bit execution units operating in...
Philipp Grabher, Johann Großschädl, Dan...
JPDC
2010
106views more  JPDC 2010»
14 years 10 months ago
Feedback-directed page placement for ccNUMA via hardware-generated memory traces
Non-uniform memory architectures with cache coherence (ccNUMA) are becoming increasingly common, not just for large-scale high performance platforms but also in the context of mul...
Jaydeep Marathe, Vivek Thakkar, Frank Mueller
SIGMOD
1991
ACM
104views Database» more  SIGMOD 1991»
15 years 3 months ago
Managing Persistent Objects in a Multi-Level Store
This paper presents an architecture for a persistent object store in which multi-level storage is explicitly included. Traditionally, DBMSs have assumed that all accessible data r...
Michael Stonebraker
ICC
2007
IEEE
120views Communications» more  ICC 2007»
15 years 6 months ago
Fixed-Period Packet Sampling and its Application to Flow Rate Estimation
Abstract— We propose a packet sampling strategy called fixedperiod sampling, which selects at most one packet in every fixedlength period. Under the fixed-period sampling, the...
Sadayoshi Ito, Kousuke Uchiyama, Shigeo Shioda