Sciweavers

528 search results - page 83 / 106
» Introducing records by refactoring
Sort
View
USENIX
2007
14 years 12 months ago
Transparent Checkpoint-Restart of Multiple Processes on Commodity Operating Systems
The ability to checkpoint a running application and restart it later can provide many useful benefits including fault recovery, advanced resources sharing, dynamic load balancing...
Oren Laadan, Jason Nieh
CASES
2008
ACM
14 years 11 months ago
Execution context optimization for disk energy
Power, energy, and thermal concerns have constrained embedded systems designs. Computing capability and storage density have increased dramatically, enabling the emergence of hand...
Jerry Hom, Ulrich Kremer
CHES
2008
Springer
144views Cryptology» more  CHES 2008»
14 years 11 months ago
Collision-Based Power Analysis of Modular Exponentiation Using Chosen-Message Pairs
Abstract. This paper proposes new chosen-message power-analysis attacks against public-key cryptosystems based on modular exponentiation, which use specific input pairs to generate...
Naofumi Homma, Atsushi Miyamoto, Takafumi Aoki, Ak...
ERCIMDL
2008
Springer
139views Education» more  ERCIMDL 2008»
14 years 11 months ago
A Framework for Managing Multimodal Digitized Music Collections
Abstract. In this paper, we present a framework for managing heterogeneous, multimodal digitized music collections containing visual music representations (scanned sheet music) as ...
Frank Kurth, David Damm, Christian Fremerey, Meina...
INFOSCALE
2007
ACM
14 years 11 months ago
A dubiety-determining based model for database cumulated anomaly intrusion
— The concept of Cumulated Anomaly (CA), which describes a new type of database anomalies, is addressed. A typical CA intrusion is that when a user who is authorized to modify da...
Gang Lu, Junkai Yi, Kevin Lü