Results 71 to 80 of about 20,930 (183)
Dynamic Information Flow Tracking on Multicores [PDF]
Dynamic Information Flow Tracking (DIFT) is a promising technique for detecting software attacks. Due to the computationally intensive nature of the technique, prior efficient implementations [21, 6] rely on specialized hardware support whose only ...
Gupta, Rajiv +3 more
core +1 more source
Dynamic Risk From Mexican Wolves and Mountain Lions Influences Elk Foraging Behavior
We observed elk foraging across a wolf risk gradient throughout all seasons and diel periods to quantify proportions of foraging, intense vigilance, and multitasking at the individual and herd levels. We quantified encounter and kill risk from Mexican wolves and mountain lions using habitat selection functions and utilization distributions.
Julia E. Olson +8 more
wiley +1 more source
IBPC: An Approach for Mitigation of Cache Pollution Attack in NDN using Interface-Based Popularity [PDF]
Naveen Kumar, Shashank Srivast
openalex +1 more source
Software Grand Exposure: SGX Cache Attacks Are Practical
Side-channel information leakage is a known limitation of SGX. Researchers have demonstrated that secret-dependent information can be extracted from enclave execution through page-fault access patterns.
Brasser, Ferdinand +5 more
core
ARC: Protecting against HTTP Parameter Pollution Attacks Using Application Request Caches [PDF]
HTTP Parameter Pollution (HPP) vulnerabilities allow attackers to exploit web applications by manipulating the query parameters of the requested URLs. In this paper, we present Application Request Cache (ARC), a framework for protecting web applications against HPP exploitation.
Elias Athanasopoulos +3 more
openaire +1 more source
Dynamic Energy Management for Chip Multi-processors under Performance Constraints [PDF]
We introduce a novel algorithm for dynamic energy management (DEM) under performance constraints in chip multi-processors (CMPs). Using the novel concept of delayed instructions count, performance loss estimations are calculated at the end of each ...
Ababei, Cristinel +1 more
core +1 more source
Poor Man's Content Centric Networking (with TCP) [PDF]
A number of different architectures have been proposed in support of data-oriented or information-centric networking. Besides a similar visions, they share the need for designing a new networking architecture.
Budigere, K. +3 more
core +1 more source
Caching and Distributing Statistical Analyses in R [PDF]
We present the cacher package for R, which provides tools for caching statistical analyses and for distributing these analyses to others in an efficient manner.
Roger Peng
core +1 more source
The Blacklisting Memory Scheduler: Balancing Performance, Fairness and Complexity [PDF]
In a multicore system, applications running on different cores interfere at main memory. This inter-application interference degrades overall system performance and unfairly slows down applications.
Lee, Donghyuk +4 more
core

