Sciweavers

1816 search results - page 42 / 364
» Trace oblivious computation
Sort
View
90
Voted
ACNS
2007
Springer
112views Cryptology» more  ACNS 2007»
15 years 5 months ago
A New Protocol for Conditional Disclosure of Secrets and Its Applications
Many protocols that are based on homomorphic encryption are private only if a client submits inputs from a limited range S. Conditional disclosure of secrets (CDS) helps to overcom...
Sven Laur, Helger Lipmaa
AIMS
2009
Springer
15 years 5 months ago
Visualization of Node Interaction Dynamics in Network Traces
The analysis of network traces often requires to find the spots where something interesting happens. Since traces are usually very large data-sets, it is often not easy and time i...
Petar Dobrev, Sorin Stancu-Mara, Jürgen Sch&o...
IPPS
2006
IEEE
15 years 4 months ago
Aligning traces for performance evaluation
For many performance analysis problems, the ability to reason across traces is invaluable. However, due to non-determinism in the OS and virtual machines, even two identical runs ...
Todd Mytkowicz, Amer Diwan, Matthias Hauswirth, Pe...
ICAC
2005
IEEE
15 years 4 months ago
Multi-resolution Abnormal Trace Detection Using Varied-length N-grams and Automata
Detection and diagnosis of faults in a large-scale distributed system is a formidable task. Interest in monitoring and using traces of user requests for fault detection has been o...
Guofei Jiang, Haifeng Chen, Cristian Ungureanu, Ke...
IPPS
1998
IEEE
15 years 3 months ago
Aggressive Dynamic Execution of Multimedia Kernel Traces
There has been relatively little analytical work on processor optimizations for multimedia applications. With the
Benjamin Bishop, Robert Michael Owens, Mary Jane I...