Sciweavers

5123 search results - page 70 / 1025
» Performance and Security Tradeoff
Sort
View
NOMS
2008
IEEE
181views Communications» more  NOMS 2008»
15 years 4 months ago
Coordinated management of power usage and runtime performance
— With the continued growth of computing power and reduction in physical size of enterprise servers, the need for actively managing electrical power usage in large datacenters is...
Malgorzata Steinder, Ian Whalley, James E. Hanson,...
QSHINE
2009
IEEE
15 years 4 months ago
Joint Optimization of System Lifetime and Network Performance for Real-Time Wireless Sensor Networks
Maximizing the aggregate network utility and minimizing the network energy consumption are important but conflict goals in wireless sensor networks. Challenges arise due to the app...
Lei Rao, Xue Liu, Jian-Jia Chen, Wenyu Liu
TSP
2010
14 years 4 months ago
Rate distortion bounds on passive sonar performance
Abstract-- Information theory provides a novel perspective on passive sonar performance analysis. This approach begins by partitioning the search space and then considers the probl...
Tianzhu Meng, John R. Buck
ICISC
2009
132views Cryptology» more  ICISC 2009»
14 years 8 months ago
Side-Channel Analysis of Cryptographic Software via Early-Terminating Multiplications
Abstract. The design of embedded processors demands a careful tradeoff between many conflicting objectives such as performance, silicon area and power consumption. Finding such a t...
Johann Großschädl, Elisabeth Oswald, Da...
101
Voted
CCS
2003
ACM
15 years 3 months ago
Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays
Network based intruders seldom attack directly from their own hosts, but rather stage their attacks through intermediate “stepping stones” to conceal their identity and origin...
Xinyuan Wang, Douglas S. Reeves