Hardware signatures based on Bloom filters are used to support and accelerate membership query in a set of items. They use modest hardware at the cost of false positives, but never produce false negatives. Signatures were traditionally used in different distributed and network applications, but in recent years their use has been extended to other fields (for instance, support for manycore/multicore parallel programming, such as data race detection, deterministic replay or transactional memory (TM)). One drawback of signatures is that they have a fixed size, and what is a good signature size for one application, may be not appropriate for another. Recently, we proposed a shared hardware module for managing signatures based on a collection of...
Bloom Filters are efficient randomized data structures for membership queries on a set with a certai...
Many network security applications require large virus signature sets to be maintained, retrieved, a...
Although software based techniques are widely accepted in computer security systems, there is a grow...
TRANSACTIONAL MEMORY (TM) systems ease multithreaded application development by giving the programme...
Signatures have been proposed in transactional memory systems to represent read and write sets and t...
This thesis contributes to the area of hardware support for parallel programming by introducing new ...
2012-11-12Chip Multiprocessors (CMPs) are becoming the mainstream due to the physical power limits o...
Bloom filters have been very interesting in networking because they enable the high speed, low cost ...
Transactional Memory (TM) simplifies parallel programming by supporting parallel tasks that execute ...
Modern computing systems gain performance by several means such as increased parallelism through usi...
CFS is the first practical code-based signature scheme. In the present paper, we present the initial...
© 2021 ACM.A blockchain wallet is a financial application which provides an interface for managing a...
Detecting data races in parallel programs is important for both soft-ware development and production...
Many fields of computing such as Deep Packet Inspection (DPI) employ string matching modules (SMM) t...
Signatures detect changes to the data objects. Numerous schemes are known, e.g., the popular hash b...
Bloom Filters are efficient randomized data structures for membership queries on a set with a certai...
Many network security applications require large virus signature sets to be maintained, retrieved, a...
Although software based techniques are widely accepted in computer security systems, there is a grow...
TRANSACTIONAL MEMORY (TM) systems ease multithreaded application development by giving the programme...
Signatures have been proposed in transactional memory systems to represent read and write sets and t...
This thesis contributes to the area of hardware support for parallel programming by introducing new ...
2012-11-12Chip Multiprocessors (CMPs) are becoming the mainstream due to the physical power limits o...
Bloom filters have been very interesting in networking because they enable the high speed, low cost ...
Transactional Memory (TM) simplifies parallel programming by supporting parallel tasks that execute ...
Modern computing systems gain performance by several means such as increased parallelism through usi...
CFS is the first practical code-based signature scheme. In the present paper, we present the initial...
© 2021 ACM.A blockchain wallet is a financial application which provides an interface for managing a...
Detecting data races in parallel programs is important for both soft-ware development and production...
Many fields of computing such as Deep Packet Inspection (DPI) employ string matching modules (SMM) t...
Signatures detect changes to the data objects. Numerous schemes are known, e.g., the popular hash b...
Bloom Filters are efficient randomized data structures for membership queries on a set with a certai...
Many network security applications require large virus signature sets to be maintained, retrieved, a...
Although software based techniques are widely accepted in computer security systems, there is a grow...