Memory

Results: 23062



#Item
581

Signatures Resilient to Continual Leakage on Memory and Computation Tal Malkin∗ Isamu Teranishi†

Add to Reading List

Source URL: eprint.iacr.org

- Date: 2010-10-09 09:51:54
    582

    C O M P U T ER S C I E N C E DEPARTMENT COLLOQUIUM Optimizing for Eager: Improving Software Transactional Memory through Reservations Dr. Patrick Lam

    Add to Reading List

    Source URL: pdf.cs.ua.edu

    - Date: 2012-09-11 12:01:09
      583

      BitMat: A Main-memory Bit Matrix of RDF Triples for Conjunctive Triple Pattern Queries Medha Atre Jagannathan Srinivasan

      Add to Reading List

      Source URL: www.cs.rpi.edu

      - Date: 2014-05-23 03:15:05
        584

        Anforderungen an das In-Memory-Data-Management als Schritt zum Echtzeitunternehmen 1 Dirk Schmalzried, 2Rainer Alt

        Add to Reading List

        Source URL: www.real-time-scm.com

        - Date: 2014-10-15 08:09:44
          585

          Cryptography Resilient to Continual Memory Leakage Zvika Brakerski∗ Yael Tauman Kalai† Jonathan Katz‡

          Add to Reading List

          Source URL: eprint.iacr.org

          - Date: 2010-05-11 17:26:42
            586

            FUJITSU SEMICONDUCTOR DATA SHEET DS5010v01-E Memory FRAM

            Add to Reading List

            Source URL: media.digikey.com

            - Date: 2013-09-03 12:33:15
              587

              PTSD & Memory Amygdala The amygdala is part of our ‘threat system’. Its job is to keep us safe by alerting us to danger. It does this by setting off an alarm in our body: by triggering the ‘fight or flight’

              Add to Reading List

              Source URL: thefementalists.files.wordpress.com

              - Date: 2013-09-20 10:03:17
                588

                In-Memory Analytics Welcome! This seminar will start promptly at 11:00 Eastern Time. To connect to the audio, please dialand enter the

                Add to Reading List

                Source URL: www.smartarrays.com

                - Date: 2009-07-01 14:31:34
                  589

                  Control of Autonomic Parallelism Adaptation on Software Transactional Memory Naweiluo Zhou, Gwena¨el Delaval, Bogdan Robu, Eric Rutten, Jean-Fran¸cois M´ehaut To cite this version:

                  Add to Reading List

                  Source URL: hal.archives-ouvertes.fr

                  - Date: 2016-12-19 20:32:46
                    590

                    One-byte Modification for Breaking Memory Forensic Analysis Takahiro Haruyama / Hiroshi Suzuki Internet Initiative Japan Inc. for submission

                    Add to Reading List

                    Source URL: media.blackhat.com

                    - Date: 2012-04-07 15:32:01
                      UPDATE