منابع مشابه
Stealing Reality
In this paper we discuss the threat of malware targeted at extracting information about the relationships in a real-world social network as well as characteristic information about the individuals in the network, which we dub Stealing Reality. We present Stealing Reality (SR), explain why it differs from traditional types of network attacks, and discuss why its impact is significantly more dang...
متن کاملLatency-Hiding Work Stealing
With the rise of multicore computers, parallel applications no longer consist solely of computational, batch workloads, but also include applications that may, for example, take input from a user, access secondary storage or the network, or perform remote procedure calls. Such operations can incur substantial latency, requiring the program to wait for a response. In the current state of the art...
متن کاملHierarchical Work-Stealing
dynamic load-balancing on hierarchical platforms. In particular, we consider applications involving heavy communications on a distributed platform. The work-stealing algorithm introduced by Blumofe and Leiserson is a commonly used technique to balance load in a distributed environment but it suffers from poor performance with some communication-intensive applications. We describe here several v...
متن کاملStealing Your Money Through
Cyber criminals are using advanced attacks to exploit online banking systems and services to covertly steal money. This paper describes the tactics currently used by cyber criminals to conduct cyber bank robbery. The Art of Cyber Bank Robbery earn approximately $25,000. Recent botnets such as Zeus, SpyEye, and Citadel have infected millions of machines. If the same formula is applied, potential...
متن کاملResilient Work Stealing
Future generations of processors will exhibit an increase of faults over their lifetime, and it becomes increasingly expensive to solve the resulting reliability issues purely at the hardware level. We propose to model computations in terms of restartable task graphs in order to improve reliability at the software level. As a proof of concept, we present Cobra, a novel design for a shared-memor...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Philologia
سال: 2013
ISSN: 2372-1952,2372-1928
DOI: 10.21061/ph.v5i1.63