Oblivious

Results: 327



#Item
261Computer science / Computing / Virtual memory / Cache / Page replacement algorithm / Cache-oblivious algorithm / Paging / Competitive analysis / Adversary model / Analysis of algorithms / Online algorithms / Computer memory

The Worst Page-Replacement Policy Kunal Agrawal1 , Michael A. Bender2 , and Jeremy T. Fineman1 1 2

Add to Reading List

Source URL: supertech.csail.mit.edu

Language: English - Date: 2014-09-16 08:27:49
262Data / B-tree / Information / Search tree / Binary tree / Cache-oblivious algorithm / CPU cache / B-heap / Data structures / Computing / Cache

Cache-Oblivious Dynamic Search Trees by Zardosht Kasheff Submitted to the Department of Electrical Engineering and Computer Science

Add to Reading List

Source URL: supertech.csail.mit.edu

Language: English - Date: 2014-09-16 08:27:48
263Data / Information / Database management systems / Databases / Software transactional memory / Transactional memory / Serializability / Multiversion concurrency control / Database transaction / Transaction processing / Data management / Concurrency control

Concurrent Cache-Oblivious B-Trees Using Transactional Memory Bradley C. Kuszmaul ABSTRACT Cache-oblivious B-trees for data sets stored in external memory represent an application that can benefit from the use of transac

Add to Reading List

Source URL: supertech.csail.mit.edu

Language: English - Date: 2014-09-16 08:27:49
264B-tree / Computer memory / Analysis of algorithms / Cache-oblivious algorithm / Lookahead / CPU cache / Database / Search tree / Charles E. Leiserson / Computing / Cache / Data

External-Memory Search Trees with Fast Insertions by Jelani Nelson Submitted to the Department of Electrical Engineering and Computer

Add to Reading List

Source URL: supertech.csail.mit.edu

Language: English - Date: 2014-09-16 08:27:50
265Alive / The Body

Cycling Sessions Gary Stafford, [removed] Oblivious to your curiosity Not stopping to ask ‘What are you looking at?’

Add to Reading List

Source URL: www.nbwclub.org

Language: English - Date: 2011-02-09 16:38:00
266Oblivious transfer / ElGamal encryption / Digital signature / Cipher / Alice and Bob / XTR / Cryptography / Public-key cryptography / Cryptographic protocols

A Note on the Bellare-Rivest Protocol for Translucent Cryptography Zhengjun Cao1 , Lihua Liu2,∗

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-08-03 22:54:21
267Oram / Time complexity / Hash table / Circuit / Binary tree / Theoretical computer science / Applied mathematics / Analysis of algorithms

SCORAM: Oblivious RAM for Secure Computation ∗ Xiao Shaun Wang

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-09-15 11:47:32
268Communication / Communication complexity / Computational complexity theory / Quantum complexity theory / Permutation / Commitment scheme / Applied mathematics / Mathematics / Quantum information science

Extending Oblivious Transfer Efficiently or - How to get active security with constant cryptographic overhead Enrique Larraia Dept. Computer Science, University of Bristol, United Kingdom [removed]

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-09-03 09:36:57
269Education theory / Multicultural education / Multiculturalism / White privilege / Education / Critical pedagogy / Education policy

MANY AFFLUENT STUDENTS ARE OBLIVIOUS TO ISSUES OF RACE AND CLASS. HERE ARE TWO TEACHING STRATEGIES DESIGNED TO OPEN THEIR EYES. CONFRONTING WHITE PRIVILEGE

Add to Reading List

Source URL: www.tolerance.org

Language: English - Date: 2013-01-04 13:15:47
270Functional languages / Algebraic geometry / Field theory / Valuation / J / ATS / Trace / Software engineering / Algebra / Computer programming

Memory Trace Oblivious Program Execution Department of Computer Science Technical Report CS-TR-5020 Chang Liu, Michael Hicks, and Elaine Shi The University of Maryland, College Park, USA

Add to Reading List

Source URL: www.cs.umd.edu

Language: English - Date: 2013-04-26 01:19:37
UPDATE