Sciweavers

427 search results - page 65 / 86
» Measuring Performance in the Retail Industry (Position Paper...
Sort
View
CHES
2010
Springer
210views Cryptology» more  CHES 2010»
14 years 10 months ago
Flash Memory 'Bumping' Attacks
This paper introduces a new class of optical fault injection attacks called bumping attacks. These attacks are aimed at data extraction from secure embedded memory, which usually s...
Sergei Skorobogatov
IJRR
2010
130views more  IJRR 2010»
14 years 8 months ago
CAD Model-based Tracking and 3D Visual-based Control for MEMS Microassembly
This paper investigates sequential robotic microassembly for the construction of 3D micro-electro-mechanical systems (MEMS) structures using a 3D visual servoing approach. The pre...
Brahim Tamadazte, Éric Marchand, Sounkalo D...
ISCA
2011
IEEE
333views Hardware» more  ISCA 2011»
14 years 1 months ago
The impact of memory subsystem resource sharing on datacenter applications
In this paper we study the impact of sharing memory resources on five Google datacenter applications: a web search engine, bigtable, content analyzer, image stitching, and protoc...
Lingjia Tang, Jason Mars, Neil Vachharajani, Rober...
ICIA
2007
15 years 19 hour ago
When Is Assistance Really Helpful?
We regularly operate under the notion that one agent assists another when the first does something for the second. However, the story behind this is much more complicated. In thi...
Wayne Iba
149
Voted
SIGMOD
2007
ACM
105views Database» more  SIGMOD 2007»
15 years 9 months ago
An XML transaction processing benchmark
XML database functionality has been emerging in "XML-only" databases as well as in the major relational database products. Yet, there is no industry standard XML databas...
Matthias Nicola, Irina Kogan, Berni Schiefer