搜索结果: 1-15 共查到“知识库 计算机处理器技术”相关记录251条 . 查询时间(3.144 秒)
Realm: An Event-Based Low-Level Runtime for Distributed Memory Architectures
Realm Legion distributed memory deferred execution events reservations heterogeneous architectures runtime
2016/5/24
We present Realm, an event-based runtime system for heterogeneous,distributed memory machines. Realm is fully asynchronous: all runtime actions are non-blocking. Realm supports spawning computations, ...
Temperature-aware processor frequency assignment for MPSoCs using convex optimization
Temperature-aware thermal MPSoCs convex optimization
2015/8/10
The increasing processing capability of Multi-Processor Systems-on-Chips (MPSoCs) is leading to an increase in chip power dissipation, which in turn leads to significant increase in chip temperature. ...
Processor speed control with thermal constraints
Computer processors chips processors processor power function
2015/8/7
We consider the problem of adjusting speeds of multiple computer processors sharing the same thermal environment, such as a chip or multi-chip package. We assume that the speed of processor (and assoc...
A Method for Fast Revocation of Public Key Certificates and Security Capabilities
Public Key Certificate Security Capabilities
2015/8/5
We present a new approach to fast certificate revocation centered around the concept of an on-line semi-trusted mediator (SEM). The use of a SEM in conjunction with a simple threshold variant of the R...
We describe a short signature scheme which is existentially unforgeable under a chosen message attack without using random oracles. The security of our scheme depends on a new complexity assumption we...
Timing attacks are usually used to attack weak computing devices such as smartcards. We show that timing attacks apply to general software systems. Specifically, we devise a timing attack against Open...
We study the strength of certain obfuscation techniques used to protect software from reverse engineering and tampering. We show that some common obfuscation methods can be defeated using a fault inje...
We construct a fully collusion resistant tracing traitors system with sublinear size ciphertexts and constant size private keys. More precisely, let N be the total number of users. Our system generate...
Strongly Unforgeable Signatures Based on Computational Diffie-Hellman
Computational Diffie-Hellman Unforgeable Signatures
2015/8/5
A signature system is said to be strongly unforgeable if the signature is existentially unforgeable and, given signatures on some message M, the adversary cannot produce a new signature on M. Strongly...
Chosen-Ciphertext Security from Identity-Based Encryption
Identity-Based Encryption Chosen-Ciphertext Security
2015/8/5
We propose simple and efficient "CCA-secure" public-key encryption schemes (i.e., schemes secure against adaptive chosen-ciphertext attacks) based on any identity-based encryption (IBE) scheme. When i...
Let F be a 2-DNF formula on boolean variables x1,...,xn. We present a homomorphic public key encryption system that allows the public evaluation of F given an encryption of the variables x1,...,xn. In...
Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity Based Encryption
Cryptosystems Built Identity Based Encryption
2015/8/5
Recently, Canetti, Halevi, and Katz showed a general method for constructing CCA-secure encryption from identity-based encryption in the standard model. We improve the efficiency of their construction...
Group Signatures with Verifier-Local Revocation
Verifier-Local Revocation signature verifiers
2015/8/5
Group signatures have recently become important for enabling privacy-preserving attestation in projects such as Microsoft's {\sc ngscb} effort (formerly Palladium). Revocation is critical to the secur...
On the Effectiveness of Address-Space Randomization
Address-Space Randomization running code
2015/8/5
Address-space randomization is a technique used to fortify systems against buffer overflow attacks. The idea is to introduce artificial diversity by randomizing the memory location of certain system c...