A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
On the Cost of Lazy Engineering for Masked Software Implementations
[chapter]
2015
Lecture Notes in Computer Science
These experiments confirm the relevance of our analysis, and therefore quantify the cost of lazy engineering for masking. ...
We show that the cost of moving from one context to the other implies a division of the security order by two for masking schemes. ...
The overheads caused by this increased order correspond to the "cost of lazy engineering" suggested by our title, which is to balance with the significant gains in terms of development time that automation ...
doi:10.1007/978-3-319-16763-3_5
fatcat:xqkkai7b2bclppjvwzmdpvkv2y
GPU-accelerated data management under the test of time
2020
Zenodo
In this paper, we break the evolution of the technological landscape into steps and we study the applicability and performance of late materialization and data sharing in each one of them. ...
We demonstrate that the standard PCIe interconnect substantially limits the performance of state-of-the-art GPUs and we propose a hybrid materialization approach which combines eager with lazy data transfers ...
ACKNOWLEDGEMENTS This work was partially funded by the EU H2020 project Smart-DataLake (825041) and SNSF project "Efficient Real-time Analytics on General-Purpose GPUs", subside no 200021_178894/1. ...
doi:10.5281/zenodo.3827489
fatcat:wi4xpncbgjdino7r67rxoouhla
Model Checking-based Software-FMEA: Assessment of Fault Tolerance and Error Detection Mechanisms
2017
Periodica Polytechnica Electrical Engineering and Computer Science
This paper follows the latter direction, demonstrating the use of a model checking-based automated SW-FMEA approach to evaluate error detection and fault tolerance mechanisms, demonstrated on a case study ...
Failures may originate in permanent software faults commonly called bugs, and their effects can be very subtle and hard to predict, due to the complex nature of programs. ...
By knowing the costs of a solution and its characteristics (revealed by the proposed analysis approach), it should be easier for engineers to find a cost-optimal solution with the highest possible benefits ...
doi:10.3311/ppee.9755
fatcat:n32cyfydszfotk5trqw65xxbm4
Translation lookaside buffer consistency: a software approach
1989
Proceedings of the third international conference on Architectural support for programming languages and operating systems - ASPLOS-III
Performance evaluations establish the basic costs of the algorithm and show that it has minimal impact on application performance. ...
We discuss the translation lookaside buffer (TLB) consistency problem for multiprocessors, and introduce the Mach shootdown algorithm for maintaining TLJ3 consistency in software. ...
study of the costs of software TLB consistency. ...
doi:10.1145/70082.68193
dblp:conf/asplos/BlackRGHB89
fatcat:tuxrrdlb2ba5llw43ixsdpvfie
Translation lookaside buffer consistency: a software approach
1989
SIGARCH Computer Architecture News
Performance evaluations establish the basic costs of the algorithm and show that it has minimal impact on application performance. ...
We discuss the translation lookaside buffer (TLB) consistency problem for multiprocessors, and introduce the Mach shootdown algorithm for maintaining TLJ3 consistency in software. ...
study of the costs of software TLB consistency. ...
doi:10.1145/68182.68193
fatcat:3yqj25j4azeiddpo6dk2px54p4
Stop Hiding The Sharp Knives: The WebAssembly Linux Interface
[article]
2023
arXiv
pre-print
We present an implementation of WALI in a modern WebAssembly engine and evaluate its performance on a number of applications which we can now compile with mostly trivial effort. ...
With a well-specified low-level virtual instruction set, minimal memory footprint and many high-performance implementations, it has been successfully adopted for lightweight in-process memory sandboxing ...
This cost can be made cheaper through various runtime optimizations -for example, the Wasmtime [10] engine has optimized instance creation heavily through lazy loading and copy-on-write paging optimizations ...
arXiv:2312.03858v1
fatcat:de4w5dtptraexgxuz47w2jzddu
Four mechanisms for adaptable systems: a meta-level approach to building a software product line
2005
Software Process: Improvement and Practice
On the basis of our experience, we discuss the influence of meta-level architectures on product line engineering, and the advantages of domain-specific languages. ...
We have developed a meta-level architecture for a software product line of legal expert systems. Four meta-level mechanisms support both variability and evolution of the product line. ...
If, however, the database connection is rather slow, we will use lazy load. Otherwise, the user would have to wait too long for the first mask. ...
doi:10.1002/spip.222
fatcat:uiyu4xfrvbb7fbzgih3kc6jn6m
Efficient Implementation of NIST-Compliant Elliptic Curve Cryptography for Sensor Nodes
[chapter]
2013
Lecture Notes in Computer Science
One of our contributions is a novel lazy doubling method for multi-precision squaring which provides better performance than any of the previouslyproposed squaring techniques. ...
Our results significantly improve the state-of-the-art in ECDH and ECDSA computation on the P-192 curve, outperforming the previous best implementations in the literature by a factor of 1.35 and 2.33, ...
In Section 3, we introduce our implementation of the field operations for the 192-bit prime, including the new "lazy doubling" method for multi-precision squaring. ...
doi:10.1007/978-3-319-02726-5_22
fatcat:q4qbtlilzrg2hgjp4erdfz72ra
Four Mechanisms for Adaptable Systems
[chapter]
2004
Lecture Notes in Computer Science
On the basis of our experience, we discuss the influence of meta-level architectures on product line engineering, and the advantages of domain-specific languages. ...
We have developed a meta-level architecture for a software product line of legal expert systems. Four meta-level mechanisms support both variability and evolution of the product line. ...
If, however, the database connection is rather slow, we will use lazy load. Otherwise, the user would have to wait too long for the first mask. ...
doi:10.1007/978-3-540-28630-1_4
fatcat:6t4q4stpojfilb2u4y5umsnxby
On the Effect of the (Micro)Architecture on the Development of Side-Channel Resistant Software
[article]
2020
IACR Cryptology ePrint Archive
As a result, masked software implementations in practice do not exhibit the security one would expect in theory. ...
There are many examples of how to assess the side-channel resistance of a hardware implementation for a given order, where one has to take into account all transitions and glitches produced by a given ...
On the cost of Lazy Engineering. Balasch et al. ...
dblp:journals/iacr/MeyerMT20
fatcat:z5qhyuexyvcprpy6cbxvgnrki4
Working with persistent objects: to swizzle or not to swizzle
1992
IEEE Transactions on Software Engineering
The model has a number of parameters, which we have measured for a particular instance of the Mneme persistent object store, varying the swizzling technique used. ...
Here we describe a simplifying model of application behavior, revealing those aspects where swizzling is most relevant in both benefits and costs. ...
Why does lazy swizzling cost more than eager swizzling? One reason is that lazy swizzling, in our implementation, involves continual residency checks avoided by eager swizzling. ...
doi:10.1109/32.153378
fatcat:m6u6k3u525bzpcj2n7uhrxgggq
3D car shape reconstruction from a contour sketch using GAN and lazy learning
2021
The Visual Computer
The system learns from a synthetic database of 3D car models and their corresponding 2D contour sketches and segmentation masks, allowing effective training with minimal data collection cost. ...
The core of the system is a machine learning pipeline that combines the use of a generative adversarial network (GAN) and lazy learning. ...
Masks are one of the sub-task outcomes for depths, so we ignored such mask images when training the discriminator. ...
doi:10.1007/s00371-020-02024-y
fatcat:q62huylxcjej7js2i7fqcme7kq
KubeEdge.AI: AI Platform for Edge Devices
[article]
2020
arXiv
pre-print
Here we propose KubeEdge.AI, an edge AI framework on top of KubeEdge. ...
The demand for smartness in embedded systems has been mounting up drastically in the past few years. ...
We are focusing on building the foundation components of KubeEdge.AI, including TSDB, processing engine and basic AI capability etc. Full AI engine and end-to-end flow will be built in next steps. ...
arXiv:2007.09227v1
fatcat:2olvn2m55rdclghhy26lol4q5q
AUTOBEST: a united AUTOSAR-OS and ARINC 653 kernel
2015
21st IEEE Real-Time and Embedded Technology and Applications Symposium
Based on the kernel abstractions of futexes and lazy priority switching, these libraries provide domain specific synchronization mechanisms. ...
We show that their domain-specific requirements have a common basis and can be implemented with a small partitioning microkernel-based design on embedded microcontrollers with memory protection (MPU) support ...
reviewers for their helpful comments on the first version of this paper. ...
doi:10.1109/rtas.2015.7108435
dblp:conf/rtas/ZuepkeBL15
fatcat:3atpst22mzd5fb5eftczc2ihjm
Software Fault-Tolerance with Off-the-Shelf SQL Servers
[chapter]
2004
Lecture Notes in Computer Science
First, we describe the use of a protective wrapper to mask the effects of a bug in one of the servers, without depending on an adequate fix from the vendors. ...
With off-the-shelf software, software fault tolerance is almost the only means available for assuring better dependability than the off-the-shelf software offers, without the much higher costs of bespoke ...
for the helpful comments on an earlier draft of this paper. ...
doi:10.1007/978-3-540-24645-9_23
fatcat:2l35objfnfgjvhmymjmn45i4xi
« Previous
Showing results 1 — 15 out of 2,232 results