Graz University of Technology

Results: 266



#Item
31JavaScript Zero: Real JavaScript and Zero Side-Channel Attacks Michael Schwarz, Moritz Lipp and Daniel Gruss Graz University of Technology {michael.schwarz,moritz.lipp,daniel.gruss}@iaik.tugraz.at Abstract—Modern web b

JavaScript Zero: Real JavaScript and Zero Side-Channel Attacks Michael Schwarz, Moritz Lipp and Daniel Gruss Graz University of Technology {michael.schwarz,moritz.lipp,daniel.gruss}@iaik.tugraz.at Abstract—Modern web b

Add to Reading List

Source URL: mlq.me

- Date: 2018-03-02 04:05:47
    32Rowhammer Attacks: An Extended Walkthrough Guide Daniel Gruss, Graz University of Technology July 27, 2017  www.tugraz.at

    Rowhammer Attacks: An Extended Walkthrough Guide Daniel Gruss, Graz University of Technology July 27, 2017 www.tugraz.at

    Add to Reading List

    Source URL: gruss.cc

    - Date: 2017-06-27 05:07:21
      33Variational Inference for Policy Search in changing Situations  Gerhard Neumann GERHARD @ IGI . TU - GRAZ . AC . AT Institute for Theoretical Computer Science, Graz University of Technology, A-8010 Graz, Austria

      Variational Inference for Policy Search in changing Situations Gerhard Neumann GERHARD @ IGI . TU - GRAZ . AC . AT Institute for Theoretical Computer Science, Graz University of Technology, A-8010 Graz, Austria

      Add to Reading List

      Source URL: www.ias.informatik.tu-darmstadt.de

      - Date: 2012-10-26 11:44:14
        34Variational Depth Superresolution using Example-Based Edge Representations David Ferstl, Matthias R¨uther and Horst Bischof Graz University of Technology Institute for Computer Graphics and Vision Inffeldgasse 16, 8010

        Variational Depth Superresolution using Example-Based Edge Representations David Ferstl, Matthias R¨uther and Horst Bischof Graz University of Technology Institute for Computer Graphics and Vision Inffeldgasse 16, 8010

        Add to Reading List

        Source URL: www.cv-foundation.org

        - Date: 2015-10-24 15:01:53
          35A Study of Morphological Computation by using Probabilistic Inference for Motor Planning Elmar R¨ uckert∗ Institute for Theoretical Computer Science Graz University of Technology

          A Study of Morphological Computation by using Probabilistic Inference for Motor Planning Elmar R¨ uckert∗ Institute for Theoretical Computer Science Graz University of Technology

          Add to Reading List

          Source URL: www.ias.informatik.tu-darmstadt.de

          - Date: 2012-12-13 06:56:49
            36Fitted Q-iteration by Advantage Weighted Regression  Gerhard Neumann Institute for Theoretical Computer Science Graz University of Technology A-8010 Graz, Austria

            Fitted Q-iteration by Advantage Weighted Regression Gerhard Neumann Institute for Theoretical Computer Science Graz University of Technology A-8010 Graz, Austria

            Add to Reading List

            Source URL: www-clmc.usc.edu

            - Date: 2009-01-13 06:30:43
              37ARMageddon: Cache Attacks on Mobile Devices Moritz Lipp, Daniel Gruss, Raphael Spreitzer, Clémentine Maurice, and Stefan Mangard, Graz University of Technology https://www.usenix.org/conference/usenixsecurity16/technica

              ARMageddon: Cache Attacks on Mobile Devices Moritz Lipp, Daniel Gruss, Raphael Spreitzer, Clémentine Maurice, and Stefan Mangard, Graz University of Technology https://www.usenix.org/conference/usenixsecurity16/technica

              Add to Reading List

              Source URL: www.usenix.org

              - Date: 2016-08-10 03:08:05
                38Show Me the Invisible: Visualizing Hidden Content Thomas Geymayer Markus Steinberger Alexander Lex Graz University of Technology Graz University of Technology Harvard University

                Show Me the Invisible: Visualizing Hidden Content Thomas Geymayer Markus Steinberger Alexander Lex Graz University of Technology Graz University of Technology Harvard University

                Add to Reading List

                Source URL: sci.utah.edu

                - Date: 2016-08-31 00:33:29
                  39DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks Peter Pessl, Daniel Gruss, Clémentine Maurice, Michael Schwarz, and Stefan Mangard, Graz University of Technology https://www.usenix.org/conference/usenixsecurity1

                  DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks Peter Pessl, Daniel Gruss, Clémentine Maurice, Michael Schwarz, and Stefan Mangard, Graz University of Technology https://www.usenix.org/conference/usenixsecurity1

                  Add to Reading List

                  Source URL: www.usenix.org

                  - Date: 2016-08-10 03:08:06
                    40PARTY Parameterized Synthesis of Token Rings? Ayrat Khalimov, Swen Jacobs, and Roderick Bloem Graz University of Technology, Austria  Abstract. Synthesis is the process of automatically constructing an implementation fro

                    PARTY Parameterized Synthesis of Token Rings? Ayrat Khalimov, Swen Jacobs, and Roderick Bloem Graz University of Technology, Austria Abstract. Synthesis is the process of automatically constructing an implementation fro

                    Add to Reading List

                    Source URL: www.swenjacobs.com

                    - Date: 2013-04-09 09:22:52