Sciweavers

5275 search results - page 331 / 1055
» Computing by observing
Sort
View
ISCA
2012
IEEE
242views Hardware» more  ISCA 2012»
13 years 7 months ago
Side-channel vulnerability factor: A metric for measuring information leakage
There have been many attacks that exploit side-effects of program execution to expose secret information and many proposed countermeasures to protect against these attacks. Howeve...
John Demme, Robert Martin, Adam Waksman, Simha Set...
ASAP
2008
IEEE
82views Hardware» more  ASAP 2008»
15 years 11 months ago
Run-time thread sorting to expose data-level parallelism
We address the problem of data parallel processing for computational quantum chemistry (CQC). CQC is a computationally demanding tool to study the electronic structure of molecule...
Tirath Ramdas, Gregory K. Egan, David Abramson, Ki...
NPC
2010
Springer
15 years 3 months ago
Differentiated Replication Strategy in Data Centers
Cloud computing has attracted a great deal of attention in both academia and industry. We envision the provision of differentiated services as being one of the key components to th...
Tung Nguyen, Anthony Cutway, Weisong Shi
TOG
2008
102views more  TOG 2008»
15 years 4 months ago
Real-time data driven deformation using kernel canonical correlation analysis
Achieving intuitive control of animated surface deformation while observing a specific style is an important but challenging task in computer graphics. Solutions to this task can ...
Wei-Wen Feng, Byung-Uck Kim, Yizhou Yu
FOCS
2006
IEEE
15 years 10 months ago
Cryptography from Anonymity
There is a vast body of work on implementing anonymous communication. In this paper, we study the possibility of using anonymous communication as a building block, and show that o...
Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, A...