Sciweavers

5477 search results - page 1069 / 1096
» Contexts, Domains, and Software
Sort
View
78
Voted
IACR
2011
110views more  IACR 2011»
13 years 9 months ago
On the (In)security of Hash-based Oblivious RAM and a New Balancing Scheme
With the gaining popularity of remote storage (e.g. in the Cloud), we consider the setting where a small, protected local machine wishes to access data on a large, untrusted remot...
Eyal Kushilevitz, Steve Lu, Rafail Ostrovsky
94
Voted
SIGCSE
2012
ACM
284views Education» more  SIGCSE 2012»
13 years 5 months ago
Teaching operating systems using android
The computing landscape is shifting towards mobile devices. To learn about operating systems, it is increasingly important for students to gain hands-on kernel programming experie...
Jeremy Andrus, Jason Nieh
SIGMOD
2012
ACM
383views Database» more  SIGMOD 2012»
12 years 12 months ago
Dynamic workload driven data integration in tableau
Tableau is a commercial business intelligence (BI) software tool that supports interactive, visual analysis of data. Armed with a visual interface to data and a focus on usability...
Kristi Morton, Ross Bunker, Jock D. Mackinlay, Rob...
DAC
1999
ACM
15 years 10 months ago
Effective Iterative Techniques for Fingerprinting Design IP
While previous watermarking-based approaches to intellectual property protection (IPP) have asymmetrically emphasized the IP provider's rights, the true goal of IPP is to ens...
Andrew E. Caldwell, Hyun-Jin Choi, Andrew B. Kahng...
DAC
1999
ACM
15 years 10 months ago
A Novel VLSI Layout Fabric for Deep Sub-Micron Applications
We propose a new VLSI layout methodology which addresses the main problems faced in Deep Sub-Micron (DSM) integrated circuit design. Our layout "fabric" scheme eliminate...
Sunil P. Khatri, Amit Mehrotra, Robert K. Brayton,...
« Prev « First page 1069 / 1096 Last » Next »