Oblivious

Results: 327



#Item
261The Worst Page-Replacement Policy Kunal Agrawal1 , Michael A. Bender2 , and Jeremy T. Fineman1 1 2

The Worst Page-Replacement Policy Kunal Agrawal1 , Michael A. Bender2 , and Jeremy T. Fineman1 1 2

Add to Reading List

Source URL: supertech.csail.mit.edu

Language: English - Date: 2014-09-16 08:27:49
262Cache-Oblivious Dynamic Search Trees by Zardosht Kasheff Submitted to the Department of Electrical Engineering and Computer Science

Cache-Oblivious Dynamic Search Trees by Zardosht Kasheff Submitted to the Department of Electrical Engineering and Computer Science

Add to Reading List

Source URL: supertech.csail.mit.edu

Language: English - Date: 2014-09-16 08:27:48
263Concurrent Cache-Oblivious B-Trees Using Transactional Memory Bradley C. Kuszmaul ABSTRACT Cache-oblivious B-trees for data sets stored in external memory represent an application that can benefit from the use of transac

Concurrent Cache-Oblivious B-Trees Using Transactional Memory Bradley C. Kuszmaul ABSTRACT Cache-oblivious B-trees for data sets stored in external memory represent an application that can benefit from the use of transac

Add to Reading List

Source URL: supertech.csail.mit.edu

Language: English - Date: 2014-09-16 08:27:49
264External-Memory Search Trees with Fast Insertions by Jelani Nelson Submitted to the Department of Electrical Engineering and Computer

External-Memory Search Trees with Fast Insertions by Jelani Nelson Submitted to the Department of Electrical Engineering and Computer

Add to Reading List

Source URL: supertech.csail.mit.edu

Language: English - Date: 2014-09-16 08:27:50
265Cycling Sessions  Gary Stafford, [removed] Oblivious to your curiosity Not stopping to ask ‘What are you looking at?’

Cycling Sessions Gary Stafford, [removed] Oblivious to your curiosity Not stopping to ask ‘What are you looking at?’

Add to Reading List

Source URL: www.nbwclub.org

Language: English - Date: 2011-02-09 16:38:00
266A Note on the Bellare-Rivest Protocol for Translucent Cryptography Zhengjun Cao1 , Lihua Liu2,∗

A Note on the Bellare-Rivest Protocol for Translucent Cryptography Zhengjun Cao1 , Lihua Liu2,∗

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-08-03 22:54:21
267SCORAM: Oblivious RAM for Secure Computation  ∗ Xiao Shaun Wang

SCORAM: Oblivious RAM for Secure Computation ∗ Xiao Shaun Wang

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-09-15 11:47:32
268Extending Oblivious Transfer Efficiently or - How to get active security with constant cryptographic overhead Enrique Larraia Dept. Computer Science, University of Bristol, United Kingdom [removed]

Extending Oblivious Transfer Efficiently or - How to get active security with constant cryptographic overhead Enrique Larraia Dept. Computer Science, University of Bristol, United Kingdom [removed]

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-09-03 09:36:57
269MANY AFFLUENT STUDENTS ARE OBLIVIOUS TO ISSUES OF RACE AND CLASS. HERE ARE TWO TEACHING STRATEGIES DESIGNED TO OPEN THEIR EYES. CONFRONTING WHITE PRIVILEGE

MANY AFFLUENT STUDENTS ARE OBLIVIOUS TO ISSUES OF RACE AND CLASS. HERE ARE TWO TEACHING STRATEGIES DESIGNED TO OPEN THEIR EYES. CONFRONTING WHITE PRIVILEGE

Add to Reading List

Source URL: www.tolerance.org

Language: English - Date: 2013-01-04 13:15:47
270Memory Trace Oblivious Program Execution Department of Computer Science Technical Report CS-TR-5020 Chang Liu, Michael Hicks, and Elaine Shi The University of Maryland, College Park, USA

Memory Trace Oblivious Program Execution Department of Computer Science Technical Report CS-TR-5020 Chang Liu, Michael Hicks, and Elaine Shi The University of Maryland, College Park, USA

Add to Reading List

Source URL: www.cs.umd.edu

Language: English - Date: 2013-04-26 01:19:37