نتایج جستجو برای: accesses to inputs

تعداد نتایج: 10618814  

2015
Daniel Gruss Raphael Spreitzer Stefan Mangard

Recent work on cache attacks has shown that CPU caches represent a powerful source of information leakage. However, existing attacks require manual identification of vulnerabilities, i.e., data accesses or instruction execution depending on secret information. In this paper, we present Cache Template Attacks. This generic attack technique allows us to profile and exploit cachebased information ...

Journal: :international journal of data envelopment analysis 0
f .emami department of mathematics, shahid rajaee teacher university, lavizan, tehran, iran. p.o.box 16785-163 m .rostamy malkhalifeh department of mathematics, science and research branch, islamic azad university, tehran, iran. h .safdari department of mathematics, shahid rajaee teacher university, lavizan, tehran, iran. p.o.box 16785-163

the calculation of rts amounts to measuring a relationship between inputs and outputs in a production structure. there are many methods to measure rts in the primal space or the dual space. one of the main approaches is using the multiplier on the convexity constraint. but returns to scale measurements in dea models are affected by the presence of regulatory constraints. these additional constr...

Journal: :IEEJ Transactions on Electronics, Information and Systems 2001

Journal: :Electronic Commerce Research and Applications 2010

2007
Weihaw Chuang Satish Narayanasamy Brad Calder Ranjit Jhala

We analyze the performance of different bounds checking implementations. Specifically, we examine using the x86 bound instruction to reduce the run-time overhead. We also propose a compiler optimization that prunes the bounds checks that are not necessary to guarantee security. The optimization is based on the observation that buffer overflow attacks are launched through external inputs. Theref...

2004
CHEN DING YUTAO ZHONG XIPENG SHEN

Profiling can accurately analyze program behavior for select data inputs. This article shows that profiling can also predict program locality for inputs other than profiled ones. Here locality is defined by the distance of data reuse. The article describes three distance-based techniques for whole-program locality analysis. The first is approximate measurement of reuse distance in near linear t...

Journal: :Academic Medicine 2017

2000
Kevin D. Rich Matthew K. Farrens

Decoupled processing seeks to dynamically schedule memory accesses in order to tolerate memory latency by prefetching operands. Since decoupled processors can not speculatively issue memory operations, control flow operations can significantly impact their ability to prefetch data. The prefetching architecture proposed here seeks to leverage the dynamic scheduling benefits of decoupled processi...

Journal: :Methodist DeBakey Cardiovascular Journal 2014

Journal: :ACM Transactions on Computer Systems 2019

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید