Sciweavers

157 search results - page 15 / 32
» Power and performance tradeoffs using various caching strate...
Sort
View
ICDE
2005
IEEE
260views Database» more  ICDE 2005»
15 years 11 months ago
A Comparative Evaluation of Transparent Scaling Techniques for Dynamic Content Servers
We study several transparent techniques for scaling dynamic content web sites, and we evaluate their relative impact when used in combination. Full transparency implies strong dat...
Cristiana Amza, Alan L. Cox, Willy Zwaenepoel
WWW
2010
ACM
15 years 5 months ago
Sync kit: a persistent client-side database caching toolkit for data intensive websites
We introduce a client-server toolkit called Sync Kit that demonstrates how client-side database storage can improve the performance of data intensive websites. Sync Kit is designe...
Edward Benson, Adam Marcus 0002, David R. Karger, ...
CHES
2006
Springer
111views Cryptology» more  CHES 2006»
15 years 1 months ago
Cache-Collision Timing Attacks Against AES
This paper describes several novel timing attacks against the common table-driven software implementation of the AES cipher. We define a general attack strategy using a simplified ...
Joseph Bonneau, Ilya Mironov
ISLPED
2006
ACM
128views Hardware» more  ISLPED 2006»
15 years 4 months ago
Design and power management of energy harvesting embedded systems
Harvesting energy from the environment is a desirable and increasingly important capability in several emerging applications of embedded systems such as sensor networks, biomedica...
Vijay Raghunathan, Pai H. Chou
DAC
2004
ACM
15 years 11 months ago
Multi-profile based code compression
Code compression has been shown to be an effective technique to reduce code size in memory constrained embedded systems. It has also been used as a way to increase cache hit ratio...
Eduardo Wanderley Netto, Rodolfo Azevedo, Paulo Ce...