Sciweavers

1124 search results - page 185 / 225
» Scalable Service Performance Monitoring
Sort
View
CTRSA
2006
Springer
146views Cryptology» more  CTRSA 2006»
15 years 5 months ago
Cache Attacks and Countermeasures: The Case of AES
We describe several software side-channel attacks based on inter-process leakage through the state of the CPU's memory cache. This leakage reveals memory access patterns, whic...
Dag Arne Osvik, Adi Shamir, Eran Tromer
VLDB
2000
ACM
119views Database» more  VLDB 2000»
15 years 5 months ago
Process Automation as the Foundation for E-Business
E-business is becoming the trademark of the 2000s. Companies are using the Web to communicate with their partners, connect with their back-end systems, and perform e-commerce tran...
Fabio Casati, Ming-Chien Shan
CONEXT
2005
ACM
15 years 3 months ago
Janus: an architecture for flexible access to sensor networks
We present the design and implementation of the Janus1 architecture for providing flexible and lightweight access to sensor network resources from Internet-type networks. Janus p...
Richard Gold
MASCOTS
2010
15 years 3 months ago
An Analytical Model with Improved Accuracy of IEEE 802.11 Protocol Under Unsaturated Conditions
In this work the authors present an analytical model that -- compared to previously published work -- more accurately captures the delay of IEEE 802.11 protocol under low, medium,...
Kumaran Vijayasankar, Azar Taufique, Lakshmi Naras...
DSS
2007
231views more  DSS 2007»
15 years 1 months ago
Self-healing systems - survey and synthesis
As modern software-based systems and applications gain in versatility and functionality, the ability to manage inconsistent resources and service disparate user requirements becom...
Debanjan Ghosh, Raj Sharman, H. Raghav Rao, Shambh...