Results 71 to 80 of about 20,930 (183)

Dynamic Information Flow Tracking on Multicores [PDF]

open access: yes, 2008
Dynamic Information Flow Tracking (DIFT) is a promising technique for detecting software attacks. Due to the computationally intensive nature of the technique, prior efficient implementations [21, 6] rely on specialized hardware support whose only ...
Gupta, Rajiv   +3 more
core   +1 more source

Dynamic Risk From Mexican Wolves and Mountain Lions Influences Elk Foraging Behavior

open access: yesEcology and Evolution, Volume 15, Issue 12, December 2025.
We observed elk foraging across a wolf risk gradient throughout all seasons and diel periods to quantify proportions of foraging, intense vigilance, and multitasking at the individual and herd levels. We quantified encounter and kill risk from Mexican wolves and mountain lions using habitat selection functions and utilization distributions.
Julia E. Olson   +8 more
wiley   +1 more source

Software Grand Exposure: SGX Cache Attacks Are Practical

open access: yes, 2017
Side-channel information leakage is a known limitation of SGX. Researchers have demonstrated that secret-dependent information can be extracted from enclave execution through page-fault access patterns.
Brasser, Ferdinand   +5 more
core  

ARC: Protecting against HTTP Parameter Pollution Attacks Using Application Request Caches [PDF]

open access: yes, 2012
HTTP Parameter Pollution (HPP) vulnerabilities allow attackers to exploit web applications by manipulating the query parameters of the requested URLs. In this paper, we present Application Request Cache (ARC), a framework for protecting web applications against HPP exploitation.
Elias Athanasopoulos   +3 more
openaire   +1 more source

Dynamic Energy Management for Chip Multi-processors under Performance Constraints [PDF]

open access: yes, 2017
We introduce a novel algorithm for dynamic energy management (DEM) under performance constraints in chip multi-processors (CMPs). Using the novel concept of delayed instructions count, performance loss estimations are calculated at the end of each ...
Ababei, Cristinel   +1 more
core   +1 more source

Poor Man's Content Centric Networking (with TCP) [PDF]

open access: yes, 2011
A number of different architectures have been proposed in support of data-oriented or information-centric networking. Besides a similar visions, they share the need for designing a new networking architecture.
Budigere, K.   +3 more
core   +1 more source

Caching and Distributing Statistical Analyses in R [PDF]

open access: yes
We present the cacher package for R, which provides tools for caching statistical analyses and for distributing these analyses to others in an efficient manner.
Roger Peng
core   +1 more source

The Blacklisting Memory Scheduler: Balancing Performance, Fairness and Complexity [PDF]

open access: yes, 2015
In a multicore system, applications running on different cores interfere at main memory. This inter-application interference degrades overall system performance and unfairly slows down applications.
Lee, Donghyuk   +4 more
core  

Home - About - Disclaimer - Privacy