<--- Back to Details
First PageDocument Content
Information retrieval / Information / Cache algorithms / Internet search / HTTP / Web search query / Proxy server / Web cache / Hoarding / Cache / Information science / Computing
Date: 2012-03-22 09:28:01
Information retrieval
Information
Cache algorithms
Internet search
HTTP
Web search query
Proxy server
Web cache
Hoarding
Cache
Information science
Computing

Add to Reading List

Source URL: www.ics.forth.gr

Download Document from Source Website

File Size: 67,72 KB

Share Document on Facebook

Similar Documents

Computer security / Cryptography / Trusted computing / Computer architecture / X86 instructions / Elliptic curve cryptography / Enhanced privacy ID / Software Guard Extensions / Digital signature / Public-key cryptography / Trusted Execution Technology / CPU cache

CacheQuote: Efficiently Recovering Long-term Secrets of SGX EPID via Cache Attacks

DocID: 1xVnr - View Document

Computing / Computer architecture / Computer hardware / Computer memory / Central processing unit / Web programming / X86 architecture / Google Native Client / CPU cache / Spectre / JavaScript / Cache

Drive-By Key-Extraction Cache Attacks from Portable Code

DocID: 1xTTi - View Document

2014_logo_MENESR_horizontal_web

DocID: 1uWuR - View Document

EC-Cache: Load-balanced, Low-latency Cluster Caching with Online Erasure Coding K. V. Rashmi1 , Mosharaf Chowdhury2 , Jack Kosaian2 , Ion Stoica1 , Kannan Ramchandran1 1 High-level

DocID: 1uT0Y - View Document

JH “Cache - The Root of Some Evil” A vast majority of the ECF help desk calls we receive can be rectified simply by clearing your web browser’s cache or temporary internet files. Symptoms have ranged from

DocID: 1utYk - View Document