Sciweavers

4911 search results - page 349 / 983
» Tree dependence analysis
Sort
View
IOLTS
2006
IEEE
68views Hardware» more  IOLTS 2006»
15 years 11 months ago
Power Attacks on Secure Hardware Based on Early Propagation of Data
The early propagation effect found in many logic gates is a potential source of data-dependent power consumption. We show that the effect and the corresponding power dependency ca...
Konrad J. Kulikowski, Mark G. Karpovsky, Alexander...
CAV
2008
Springer
152views Hardware» more  CAV 2008»
15 years 7 months ago
Heap Assumptions on Demand
Termination of a heap-manipulating program generally depends on preconditions that express heap assumptions (i.e., assertions describing reachability, aliasing, separation and shar...
Andreas Podelski, Andrey Rybalchenko, Thomas Wies
IJHPCA
2006
73views more  IJHPCA 2006»
15 years 4 months ago
The Tau Parallel Performance System
The ability of performance technology to keep pace with the growing complexity of parallel and distributed systems depends on robust performance frameworks that can at once provid...
Sameer Shende, Allen D. Malony
STOC
2007
ACM
127views Algorithms» more  STOC 2007»
16 years 5 months ago
First to market is not everything: an analysis of preferential attachment with fitness
The design of algorithms on complex networks, such as routing, ranking or recommendation algorithms, requires a detailed understanding of the growth characteristics of the network...
Christian Borgs, Jennifer T. Chayes, Constantinos ...
ICC
2008
IEEE
118views Communications» more  ICC 2008»
15 years 11 months ago
A Principal Components Analysis-Based Robust DDoS Defense System
—One of the major threats to cyber security is the Distributed Denial-of-Service (DDoS) attack. In our previous projects, PacketScore, ALPi, and other statistical filtering-based...
Huizhong Sun, Yan Zhaung, H. Jonathan Chao