Graz University of Technology

Results: 266



#Item
31

JavaScript Zero: Real JavaScript and Zero Side-Channel Attacks Michael Schwarz, Moritz Lipp and Daniel Gruss Graz University of Technology {michael.schwarz,moritz.lipp,daniel.gruss}@iaik.tugraz.at Abstract—Modern web b

Add to Reading List

Source URL: mlq.me

- Date: 2018-03-02 04:05:47
    32

    Rowhammer Attacks: An Extended Walkthrough Guide Daniel Gruss, Graz University of Technology July 27, 2017 www.tugraz.at

    Add to Reading List

    Source URL: gruss.cc

    - Date: 2017-06-27 05:07:21
      33

      Variational Inference for Policy Search in changing Situations Gerhard Neumann GERHARD @ IGI . TU - GRAZ . AC . AT Institute for Theoretical Computer Science, Graz University of Technology, A-8010 Graz, Austria

      Add to Reading List

      Source URL: www.ias.informatik.tu-darmstadt.de

      - Date: 2012-10-26 11:44:14
        34

        Variational Depth Superresolution using Example-Based Edge Representations David Ferstl, Matthias R¨uther and Horst Bischof Graz University of Technology Institute for Computer Graphics and Vision Inffeldgasse 16, 8010

        Add to Reading List

        Source URL: www.cv-foundation.org

        - Date: 2015-10-24 15:01:53
          35

          A Study of Morphological Computation by using Probabilistic Inference for Motor Planning Elmar R¨ uckert∗ Institute for Theoretical Computer Science Graz University of Technology

          Add to Reading List

          Source URL: www.ias.informatik.tu-darmstadt.de

          - Date: 2012-12-13 06:56:49
            36

            Fitted Q-iteration by Advantage Weighted Regression Gerhard Neumann Institute for Theoretical Computer Science Graz University of Technology A-8010 Graz, Austria

            Add to Reading List

            Source URL: www-clmc.usc.edu

            - Date: 2009-01-13 06:30:43
              37

              ARMageddon: Cache Attacks on Mobile Devices Moritz Lipp, Daniel Gruss, Raphael Spreitzer, Clémentine Maurice, and Stefan Mangard, Graz University of Technology https://www.usenix.org/conference/usenixsecurity16/technica

              Add to Reading List

              Source URL: www.usenix.org

              - Date: 2016-08-10 03:08:05
                38

                Show Me the Invisible: Visualizing Hidden Content Thomas Geymayer Markus Steinberger Alexander Lex Graz University of Technology Graz University of Technology Harvard University

                Add to Reading List

                Source URL: sci.utah.edu

                - Date: 2016-08-31 00:33:29
                  39

                  DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks Peter Pessl, Daniel Gruss, Clémentine Maurice, Michael Schwarz, and Stefan Mangard, Graz University of Technology https://www.usenix.org/conference/usenixsecurity1

                  Add to Reading List

                  Source URL: www.usenix.org

                  - Date: 2016-08-10 03:08:06
                    40

                    PARTY Parameterized Synthesis of Token Rings? Ayrat Khalimov, Swen Jacobs, and Roderick Bloem Graz University of Technology, Austria Abstract. Synthesis is the process of automatically constructing an implementation fro

                    Add to Reading List

                    Source URL: www.swenjacobs.com

                    - Date: 2013-04-09 09:22:52
                      UPDATE