Sciweavers

1202 search results - page 208 / 241
» Knowledge as a Service and Knowledge Breaching
Sort
View
JOC
2010
92views more  JOC 2010»
14 years 6 months ago
Efficient Cache Attacks on AES, and Countermeasures
We describe several software side-channel attacks based on inter-process leakage through the state of the CPU's memory cache. This leakage reveals memory access patterns, whic...
Eran Tromer, Dag Arne Osvik, Adi Shamir
HICSS
2011
IEEE
226views Biometrics» more  HICSS 2011»
14 years 3 months ago
Collaborative Learning through Wireless Grids
In this paper, we describe wireless grids, an emerging technology that enables ad hoc sharing of resources (such as screen, services and microphone) on edge devices (such as mobil...
Angela Usha Ramnarine-Rieks, Lee W. McKnight, Ruth...
RTAS
2011
IEEE
14 years 3 months ago
Deterministic and Stochastic QoS Provision for Real-Time Control Systems
—In this paper, we propose two adaptive scheduling approaches to support real-time control applications with highly varying computation times. The use of a resource reservation s...
Daniele Fontanelli, Luigi Palopoli, Luca Greco
KCAP
2011
ACM
14 years 2 months ago
Language resources extracted from Wikipedia
Wikipedia provides an interesting amount of text for more than hundred languages. This also includes languages where no reference corpora or other linguistic resources are easily ...
Denny Vrandecic, Philipp Sorg, Rudi Studer
WWW
2004
ACM
16 years 14 days ago
CS AKTive space: representing computer science in the semantic web
We present a Semantic Web application that we call CS AKTive Space1 . The application exploits a wide range of semantically heterogeneous and distributed content relating to Compu...
Monica M. C. Schraefel, Nigel R. Shadbolt, Nichola...