Sciweavers

2169 search results - page 313 / 434
» Mobile Processing in Open Systems
Sort
View
JOC
2010
92views more  JOC 2010»
14 years 11 months ago
Efficient Cache Attacks on AES, and Countermeasures
We describe several software side-channel attacks based on inter-process leakage through the state of the CPU's memory cache. This leakage reveals memory access patterns, whic...
Eran Tromer, Dag Arne Osvik, Adi Shamir
METRICS
2005
IEEE
15 years 10 months ago
Visualizing Historical Data Using Spectrographs
Studying the evolution of long lived processes such as the development history of a software system or the publication history of a research community, requires the analysis of a ...
Ahmed E. Hassan, Jingwei Wu, Richard C. Holt
AND
2009
15 years 2 months ago
Kernel-based relation extraction from investigative data
In a specific process of business intelligence, i.e. investigation on organized crime, empirical language processing technologies can play a crucial role. In the data used on inve...
Cristina Giannone, Roberto Basili, Chiara Del Vesc...
GLOBECOM
2008
IEEE
15 years 11 months ago
Investigating the Performance Impact of Shared Host Capacity in Ad Hoc Networks
— Host resources (e.g., CPU time and buffer space) in mobile ad hoc networks must be shared between the devices own applications and networking functions, such as routing and pac...
Yan He, Ikhlas Ajbar, Van Nguyen, Dmitri Perkins
ISCC
2007
IEEE
109views Communications» more  ISCC 2007»
15 years 10 months ago
MBMS Power Planning in Macro and Micro Cell Environments
Multimedia Broadcast Multicast Services (MBMS), introduced in Third Generation Partnership Project (3GPP) Release 6, is a point-to-multipoint downlink bearer service that addresse...
Antonios G. Alexiou, Christos Bouras, Vasileios Ko...