Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








2,232 Hits in 5.2 sec

On the Cost of Lazy Engineering for Masked Software Implementations [chapter]

Josep Balasch, Benedikt Gierlichs, Vincent Grosso, Oscar Reparaz, François-Xavier Standaert
2015 Lecture Notes in Computer Science  
These experiments confirm the relevance of our analysis, and therefore quantify the cost of lazy engineering for masking.  ...  We show that the cost of moving from one context to the other implies a division of the security order by two for masking schemes.  ...  The overheads caused by this increased order correspond to the "cost of lazy engineering" suggested by our title, which is to balance with the significant gains in terms of development time that automation  ... 
doi:10.1007/978-3-319-16763-3_5 fatcat:xqkkai7b2bclppjvwzmdpvkv2y

GPU-accelerated data management under the test of time

Aunn Raza, Periklis Chrysogelos, Panagiotis Sioulas, Vladimir Indjic, Angelos Christos Anadiotis, Anastasia Ailamaki
2020 Zenodo  
In this paper, we break the evolution of the technological landscape into steps and we study the applicability and performance of late materialization and data sharing in each one of them.  ...  We demonstrate that the standard PCIe interconnect substantially limits the performance of state-of-the-art GPUs and we propose a hybrid materialization approach which combines eager with lazy data transfers  ...  ACKNOWLEDGEMENTS This work was partially funded by the EU H2020 project Smart-DataLake (825041) and SNSF project "Efficient Real-time Analytics on General-Purpose GPUs", subside no 200021_178894/1.  ... 
doi:10.5281/zenodo.3827489 fatcat:wi4xpncbgjdino7r67rxoouhla

Model Checking-based Software-FMEA: Assessment of Fault Tolerance and Error Detection Mechanisms

Vince Molnár, István Majzik
2017 Periodica Polytechnica Electrical Engineering and Computer Science  
This paper follows the latter direction, demonstrating the use of a model checking-based automated SW-FMEA approach to evaluate error detection and fault tolerance mechanisms, demonstrated on a case study  ...  Failures may originate in permanent software faults commonly called bugs, and their effects can be very subtle and hard to predict, due to the complex nature of programs.  ...  By knowing the costs of a solution and its characteristics (revealed by the proposed analysis approach), it should be easier for engineers to find a cost-optimal solution with the highest possible benefits  ... 
doi:10.3311/ppee.9755 fatcat:n32cyfydszfotk5trqw65xxbm4

Translation lookaside buffer consistency: a software approach

D. L. Black, R. F. Rashid, D. B. Golub, C. R. Hill
1989 Proceedings of the third international conference on Architectural support for programming languages and operating systems - ASPLOS-III  
Performance evaluations establish the basic costs of the algorithm and show that it has minimal impact on application performance.  ...  We discuss the translation lookaside buffer (TLB) consistency problem for multiprocessors, and introduce the Mach shootdown algorithm for maintaining TLJ3 consistency in software.  ...  study of the costs of software TLB consistency.  ... 
doi:10.1145/70082.68193 dblp:conf/asplos/BlackRGHB89 fatcat:tuxrrdlb2ba5llw43ixsdpvfie

Translation lookaside buffer consistency: a software approach

D. L. Black, R. F. Rashid, D. B. Golub, C. R. Hill
1989 SIGARCH Computer Architecture News  
Performance evaluations establish the basic costs of the algorithm and show that it has minimal impact on application performance.  ...  We discuss the translation lookaside buffer (TLB) consistency problem for multiprocessors, and introduce the Mach shootdown algorithm for maintaining TLJ3 consistency in software.  ...  study of the costs of software TLB consistency.  ... 
doi:10.1145/68182.68193 fatcat:3yqj25j4azeiddpo6dk2px54p4

Stop Hiding The Sharp Knives: The WebAssembly Linux Interface [article]

Arjun Ramesh, Tianshu Huang, Ben L. Titzer, Anthony Rowe
2023 arXiv   pre-print
We present an implementation of WALI in a modern WebAssembly engine and evaluate its performance on a number of applications which we can now compile with mostly trivial effort.  ...  With a well-specified low-level virtual instruction set, minimal memory footprint and many high-performance implementations, it has been successfully adopted for lightweight in-process memory sandboxing  ...  This cost can be made cheaper through various runtime optimizations -for example, the Wasmtime [10] engine has optimized instance creation heavily through lazy loading and copy-on-write paging optimizations  ... 
arXiv:2312.03858v1 fatcat:de4w5dtptraexgxuz47w2jzddu

Four mechanisms for adaptable systems: a meta-level approach to building a software product line

Claudia Fritsch, Burkhardt Renz
2005 Software Process: Improvement and Practice  
On the basis of our experience, we discuss the influence of meta-level architectures on product line engineering, and the advantages of domain-specific languages.  ...  We have developed a meta-level architecture for a software product line of legal expert systems. Four meta-level mechanisms support both variability and evolution of the product line.  ...  If, however, the database connection is rather slow, we will use lazy load. Otherwise, the user would have to wait too long for the first mask.  ... 
doi:10.1002/spip.222 fatcat:uiyu4xfrvbb7fbzgih3kc6jn6m

Efficient Implementation of NIST-Compliant Elliptic Curve Cryptography for Sensor Nodes [chapter]

Zhe Liu, Hwajeong Seo, Johann Großschädl, Howon Kim
2013 Lecture Notes in Computer Science  
One of our contributions is a novel lazy doubling method for multi-precision squaring which provides better performance than any of the previouslyproposed squaring techniques.  ...  Our results significantly improve the state-of-the-art in ECDH and ECDSA computation on the P-192 curve, outperforming the previous best implementations in the literature by a factor of 1.35 and 2.33,  ...  In Section 3, we introduce our implementation of the field operations for the 192-bit prime, including the new "lazy doubling" method for multi-precision squaring.  ... 
doi:10.1007/978-3-319-02726-5_22 fatcat:q4qbtlilzrg2hgjp4erdfz72ra

Four Mechanisms for Adaptable Systems [chapter]

Claudia Fritsch, Burkhardt Renz
2004 Lecture Notes in Computer Science  
On the basis of our experience, we discuss the influence of meta-level architectures on product line engineering, and the advantages of domain-specific languages.  ...  We have developed a meta-level architecture for a software product line of legal expert systems. Four meta-level mechanisms support both variability and evolution of the product line.  ...  If, however, the database connection is rather slow, we will use lazy load. Otherwise, the user would have to wait too long for the first mask.  ... 
doi:10.1007/978-3-540-28630-1_4 fatcat:6t4q4stpojfilb2u4y5umsnxby

On the Effect of the (Micro)Architecture on the Development of Side-Channel Resistant Software [article]

Lauren De Meyer, Elke De Mulder, Michael Tunstall
2020 IACR Cryptology ePrint Archive  
As a result, masked software implementations in practice do not exhibit the security one would expect in theory.  ...  There are many examples of how to assess the side-channel resistance of a hardware implementation for a given order, where one has to take into account all transitions and glitches produced by a given  ...  On the cost of Lazy Engineering. Balasch et al.  ... 
dblp:journals/iacr/MeyerMT20 fatcat:z5qhyuexyvcprpy6cbxvgnrki4

Working with persistent objects: to swizzle or not to swizzle

J.E.B. Moss
1992 IEEE Transactions on Software Engineering  
The model has a number of parameters, which we have measured for a particular instance of the Mneme persistent object store, varying the swizzling technique used.  ...  Here we describe a simplifying model of application behavior, revealing those aspects where swizzling is most relevant in both benefits and costs.  ...  Why does lazy swizzling cost more than eager swizzling? One reason is that lazy swizzling, in our implementation, involves continual residency checks avoided by eager swizzling.  ... 
doi:10.1109/32.153378 fatcat:m6u6k3u525bzpcj2n7uhrxgggq

3D car shape reconstruction from a contour sketch using GAN and lazy learning

Naoki Nozawa, Hubert P. H. Shum, Qi Feng, Edmond S. L. Ho, Shigeo Morishima
2021 The Visual Computer  
The system learns from a synthetic database of 3D car models and their corresponding 2D contour sketches and segmentation masks, allowing effective training with minimal data collection cost.  ...  The core of the system is a machine learning pipeline that combines the use of a generative adversarial network (GAN) and lazy learning.  ...  Masks are one of the sub-task outcomes for depths, so we ignored such mask images when training the discriminator.  ... 
doi:10.1007/s00371-020-02024-y fatcat:q62huylxcjej7js2i7fqcme7kq

KubeEdge.AI: AI Platform for Edge Devices [article]

Sean Wang, Yuxiao Hu, Jason Wu
2020 arXiv   pre-print
Here we propose KubeEdge.AI, an edge AI framework on top of KubeEdge.  ...  The demand for smartness in embedded systems has been mounting up drastically in the past few years.  ...  We are focusing on building the foundation components of KubeEdge.AI, including TSDB, processing engine and basic AI capability etc. Full AI engine and end-to-end flow will be built in next steps.  ... 
arXiv:2007.09227v1 fatcat:2olvn2m55rdclghhy26lol4q5q

AUTOBEST: a united AUTOSAR-OS and ARINC 653 kernel

Alexander Zuepke, Marc Bommert, Daniel Lohmann
2015 21st IEEE Real-Time and Embedded Technology and Applications Symposium  
Based on the kernel abstractions of futexes and lazy priority switching, these libraries provide domain specific synchronization mechanisms.  ...  We show that their domain-specific requirements have a common basis and can be implemented with a small partitioning microkernel-based design on embedded microcontrollers with memory protection (MPU) support  ...  reviewers for their helpful comments on the first version of this paper.  ... 
doi:10.1109/rtas.2015.7108435 dblp:conf/rtas/ZuepkeBL15 fatcat:3atpst22mzd5fb5eftczc2ihjm

Software Fault-Tolerance with Off-the-Shelf SQL Servers [chapter]

P. Popov, L. Strigini, A. Kostov, V. Mollov, D. Selensky
2004 Lecture Notes in Computer Science  
First, we describe the use of a protective wrapper to mask the effects of a bug in one of the servers, without depending on an adequate fix from the vendors.  ...  With off-the-shelf software, software fault tolerance is almost the only means available for assuring better dependability than the off-the-shelf software offers, without the much higher costs of bespoke  ...  for the helpful comments on an earlier draft of this paper.  ... 
doi:10.1007/978-3-540-24645-9_23 fatcat:2l35objfnfgjvhmymjmn45i4xi
« Previous Showing results 1 — 15 out of 2,232 results