Sciweavers

1450 search results - page 275 / 290
» Congestible services and network effects
Sort
View
CTRSA
2006
Springer
146views Cryptology» more  CTRSA 2006»
15 years 1 months ago
Cache Attacks and Countermeasures: The Case of AES
We describe several software side-channel attacks based on inter-process leakage through the state of the CPU's memory cache. This leakage reveals memory access patterns, whic...
Dag Arne Osvik, Adi Shamir, Eran Tromer
68
Voted
ECIS
2004
14 years 11 months ago
Agile Security For Information Warfare: A Call For Research
The context of information security is changing dramatically. Networking technologies have driven the global expansion of electronic commerce. Electronic commerce is increasingly ...
Richard Baskerville
50
Voted
IADIS
2004
14 years 11 months ago
Dimensions of Facilitators for Non-Business E-Commerce Adoption
Non-business EC is a relatively new research niche in the general e-commerce stream. It denotes the use of e-commerce by non-business institutions such as academic institutions (a...
Nelson Oly Ndubisi, M. A. Masmurniwati
SIROCCO
2000
14 years 11 months ago
Cooperative computing with fragmentable and mergeable groups
ABSTRACT: This work considers the problem of performing a set of N tasks on a set of P cooperating message-passing processors (P N). The processors use a group communication servi...
Chryssis Georgiou, Alexander A. Shvartsman
CONCURRENCY
2008
124views more  CONCURRENCY 2008»
14 years 9 months ago
A service-oriented Grid environment for integration of distributed kidney models and resources
In this paper, we present a Grid computing platform that provides experimental scientists and analysts with access to computational simulations and knowledge databases hosted in s...
Xingchen Chu, Andrew Lonie, Peter Harris, S. Randa...