Sciweavers

6318 search results - page 15 / 1264
» Data Leakage Detection
Sort
View
CF
2005
ACM
14 years 11 months ago
Drowsy region-based caches: minimizing both dynamic and static power dissipation
Power consumption within the memory hierarchy grows in importance as on-chip data caches occupy increasingly greater die area. Among dynamic power conservation schemes, horizontal...
Michael J. Geiger, Sally A. McKee, Gary S. Tyson
74
Voted
CIKM
2008
Springer
14 years 11 months ago
Data degradation: making private data less sensitive over time
Trail disclosure is the leakage of privacy sensitive data, resulting from negligence, attack or abusive scrutinization or usage of personal digital trails. To prevent trail disclo...
Nicolas Anciaux, Luc Bouganim, Harold van Heerde, ...
ISVLSI
2008
IEEE
158views VLSI» more  ISVLSI 2008»
15 years 4 months ago
Improving Energy Efficiency of Configurable Caches via Temperature-Aware Configuration Selection
Active power used to be the primary contributor to total power dissipation of CMOS designs, but with the technology scaling, the share of leakage in total power consumption of dig...
Hamid Noori, Maziar Goudarzi, Koji Inoue, Kazuaki ...
MMSEC
2006
ACM
132views Multimedia» more  MMSEC 2006»
15 years 3 months ago
On achievable security levels for lattice data hiding in the known message attack scenario
This paper presents a theoretical security analysis of lattice data hiding. The security depends on the secrecy of a dither signal that randomizes the codebook. If the same secret...
Luis Pérez-Freire, Fernando Pérez-Go...
ICDT
2007
ACM
148views Database» more  ICDT 2007»
15 years 3 months ago
Ask a Better Question, Get a Better Answer A New Approach to Private Data Analysis
Cryptographic techniques for reasoning about information leakage have recently been brought to bear on the classical problem of statistical disclosure control – revealing accurat...
Cynthia Dwork