Sciweavers

5494 search results - page 1005 / 1099
» E-services Management Requirements
Sort
View
ISCA
2007
IEEE
167views Hardware» more  ISCA 2007»
15 years 7 months ago
New cache designs for thwarting software cache-based side channel attacks
Software cache-based side channel attacks are a serious new class of threats for computers. Unlike physical side channel attacks that mostly target embedded cryptographic devices,...
Zhenghong Wang, Ruby B. Lee
133
Voted
ISCA
2007
IEEE
171views Hardware» more  ISCA 2007»
15 years 7 months ago
Power provisioning for a warehouse-sized computer
Large-scale Internet services require a computing infrastructure that can be appropriately described as a warehouse-sized computing system. The cost of building datacenter facilit...
Xiaobo Fan, Wolf-Dietrich Weber, Luiz André...
RTSS
2007
IEEE
15 years 7 months ago
Chronos: Feedback Control of a Real Database System Performance
It is challenging to process transactions in a timely fashion using fresh data, e.g., current stock prices, since database workloads may considerably vary due to dynamic data/reso...
Kyoung-Don Kang, Jisu Oh, Sang Hyuk Son
SMC
2007
IEEE
125views Control Systems» more  SMC 2007»
15 years 7 months ago
Scaling with digital connection: Services innovation
—Digitization of production factors, including the knowledge for knowledge workers and consumers, opens almost infinite potential to connect persons, systems, processes, enterpri...
Cheng Hsu
SP
2007
IEEE
137views Security Privacy» more  SP 2007»
15 years 7 months ago
A Cryptographic Decentralized Label Model
Information-flow security policies are an appealing way of specifying confidentiality and integrity policies in information systems. Most previous work on language-based securit...
Jeffrey A. Vaughan, Steve Zdancewic
« Prev « First page 1005 / 1099 Last » Next »