Sciweavers

3750 search results - page 612 / 750
» Code Optimization for Code Compression
Sort
View
VLSID
2010
IEEE
200views VLSI» more  VLSID 2010»
15 years 1 months ago
Pinpointing Cache Timing Attacks on AES
The paper analyzes cache based timing attacks on optimized codes for Advanced Encryption Standard (AES). The work justifies that timing based cache attacks create hits in the fi...
Chester Rebeiro, Mainack Mondal, Debdeep Mukhopadh...
WCRE
2010
IEEE
15 years 1 months ago
Computer-Aided Extraction of Software Components
—In a software project, outsourcing the development of a particular functionality, reusing a part in another software, or handing-over a part of the code to a new team member req...
Andreas Marx, Fabian Beck, Stephan Diehl
GLOBECOM
2010
IEEE
15 years 1 months ago
Trusted Storage over Untrusted Networks
We consider distributed storage over two untrusted networks, whereby coding is used as a means to achieve a prescribed level of confidentiality. The key idea is to exploit the alge...
Paulo F. Oliveira, Luísa Lima, Tiago T. V. ...
IV
2010
IEEE
186views Visualization» more  IV 2010»
15 years 1 months ago
Visual Amortization Analysis of Recompilation Strategies
Abstract--Dynamic recompilation tries to produce more efficient code by exploiting runtime information. Virtual machines like the Jikes RVM use recompilation heuristics to decide h...
Stephan Zimmer, Stephan Diehl
MASS
2010
160views Communications» more  MASS 2010»
15 years 1 months ago
Dynamic operator replacement in sensor networks
We present an integrated approach for supporting in-network sensor data processing in dynamic and heterogeneous sensor networks. The concept relies on data stream processing techni...
Moritz Striibe, Michael Daum, Rüdiger Kapitza...