Sciweavers

981 search results - page 159 / 197
» Semantics-aware trace analysis
Sort
View
DAC
2007
ACM
15 years 5 months ago
Side-Channel Attack Pitfalls
While cryptographic algorithms are usually strong against mathematical attacks, their practical implementation, both in software and in hardware, opens the door to side-channel at...
Kris Tiri
CCGRID
2004
IEEE
15 years 5 months ago
Predicting job start times on clusters
In a Computational Grid which consists of many computer clusters, job start time predictions are useful to guide resource selections and balance the workload distribution. However...
Hui Li, David L. Groep, Jeffrey Templon, Lex Wolte...
DSN
2006
IEEE
15 years 5 months ago
An Approach for Detecting and Distinguishing Errors versus Attacks in Sensor Networks
Distributed sensor networks are highly prone to accidental errors and malicious activities, owing to their limited resources and tight interaction with the environment. Yet only a...
Claudio Basile, Meeta Gupta, Zbigniew Kalbarczyk, ...
INFOCOM
1997
IEEE
15 years 5 months ago
An Empirical Model of HTTP Network Traffic
The workload of the global Internet is dominated by the Hypertext Transfer Protocol (HTTP), an application protocol used by World Wide Web clients and servers. Simulation studies ...
Bruce A. Mah
IPPS
1995
IEEE
15 years 5 months ago
Characterizing parallel file-access patterns on a large-scale multiprocessor
High-performance parallel file systems are needed to satisfy tremendous I/O requirements of parallel scientific applications. The design of such high-performance parallel file ...
Apratim Purakayastha, Carla Schlatter Ellis, David...