Zobrazeno 1 - 10
of 17
pro vyhledávání: '"Kevin Loughlin"'
Publikováno v:
International Journal of Environmental Research and Public Health; Volume 19; Issue 18; Pages: 11795
Many Pre-K through grade 12 (PK-12) students have experienced traumatic events throughout the pandemic in a myriad of ways including the death of family members and peers, loss of social interaction and increased violence at home. The consequences ca
Publikováno v:
Proceedings of the 49th Annual International Symposium on Computer Architecture.
Publikováno v:
Proceedings of the 27th ACM International Conference on Architectural Support for Programming Languages and Operating Systems.
Publikováno v:
HotOS
Rowhammer attacks exploit electromagnetic interference among nearby DRAM cells to flip bits, corrupting data and altering system behavior. Unfortunately, DRAM vendors have opted for a blackbox approach to preventing these bit flips, exposing little i
Autor:
Baris Kasikci, Kevin Loughlin
Publikováno v:
Disruptive Technologies in Information Sciences V.
Execution context isolation is a key security requirement in personal computers, edge devices, and more importantly on multitenant computing environments such as the Cloud. It is vital that data belonging to one context (e.g., a process, enclave, or
Autor:
Gefei Zuo, Zhengwei Qi, Xiaohe Cheng, Yanqiang Liu, Baris Kasikci, Kevin Loughlin, Abel Mulugeta Eneyew, Jiacheng Ma
Publikováno v:
ASPLOS
Cloud providers widely deploy FPGAs as application-specific accelerators for customer use. These providers seek to multiplex their FPGAs among customers via virtualization, thereby reducing running costs. Unfortunately, most virtualization support is
Autor:
John C. Kricher, Kevin Loughlin
A richly illustrated nature tour of Galápagos—now expanded, thoroughly updated, and with more than 650 color photographsGalápagos is a comprehensive, up-to-date, and profusely illustrated natural history of this spectacular archipelago. Offering
Publikováno v:
MICRO
Speculative execution attacks like Meltdown and Spectre work by accessing secret data in wrong-path execution. Secrets are then transmitted and recovered by the attacker via a covert channel. Existing mitigations either require code modifications, ad
Publikováno v:
Cancer Research. 79:4016-4016
Prostate cancer (PCa) is the second most common epithelial cancer in men after lung cancer. PCa shares similar clinical symptoms with benign prostate hyperplasia (BPH) making it very challenging for physicians to make an accurate diagnosis. Prostate