Sciweavers

5171 search results - page 764 / 1035
» Deterministic Parallel Processing
Sort
View
145
Voted
CTRSA
2006
Springer
146views Cryptology» more  CTRSA 2006»
15 years 8 months ago
Cache Attacks and Countermeasures: The Case of AES
We describe several software side-channel attacks based on inter-process leakage through the state of the CPU's memory cache. This leakage reveals memory access patterns, whic...
Dag Arne Osvik, Adi Shamir, Eran Tromer
WSC
2007
15 years 6 months ago
Measuring manufacturing throughput using takt time analysis and simulation
This paper is motivated by a case study performed at a company that manufactures two main types of customized products. In an effort to significantly increase their throughput cap...
Jun Duanmu, Kevin Taaffe
IJCAI
2003
15 years 6 months ago
Toward Conditional Models of Identity Uncertainty with Application to Proper Noun Coreference
Coreference analysis, also known as record linkage or identity uncertainty, is a difficult and important problem in natural language processing, databases, citation matching and ...
Andrew McCallum, Ben Wellner
123
Voted
VIIP
2001
15 years 6 months ago
Using Graphics Cards for Quantized FEM Computations
Graphics cards exercise increasingly more computing power and are highly optimized for high data transfer volumes. In contrast typical workstations perform badly when data exceeds...
Martin Rumpf, Robert Strzodka
155
Voted
ISCAPDCS
2003
15 years 6 months ago
Optimal Graph Transformation Assuming Alternate Scheduling Models
Many computation-intensive iterative or recursive applications commonly found in digital signal processing and image processing applications can be represented by data-flow graph...
Timothy W. O'Neil