-
3
-
-
84914175643
-
-
Microsoft, "DirectX graphics and gaming," http://msdn.microsoft.com/en-us/library/windows/desktop/ee663274(v=vs.85).aspx.
-
DirectX Graphics and Gaming
-
-
-
5
-
-
85013705024
-
-
Morgan Kaufmann
-
B. Gaster, L. Howes, D. R. Kaeli, P. Mistry, and D. Schaa, Heterogeneous Computing with OpenCL. Morgan Kaufmann, 2012.
-
(2012)
Heterogeneous Computing with OpenCL
-
-
Gaster, B.1
Howes, L.2
Kaeli, D.R.3
Mistry, P.4
Schaa, D.5
-
8
-
-
84875184822
-
Kernel weaver: Automatically fusing database primitives for efficient GPU computation
-
H. Wu, G. Diamos, S. Cadambi, and S. Yalamanchili, "Kernel weaver: Automatically fusing database primitives for efficient GPU computation," in Proceedings of the 45th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO), 2012.
-
(2012)
Proceedings of the 45th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO)
-
-
Wu, H.1
Diamos, G.2
Cadambi, S.3
Yalamanchili, S.4
-
9
-
-
78149305172
-
Packet shader: A GPU-accelerated software router
-
S. Han, K. Jang, K. Park, and S. Moon, "Packet Shader: a GPU-accelerated software router," in Proceedings of the ACM SIGCOMM 2010 Conference, 2010.
-
(2010)
Proceedings of the ACM SIGCOMM 2010 Conference
-
-
Han, S.1
Jang, K.2
Park, K.3
Moon, S.4
-
11
-
-
84869475315
-
Kargus: A highly-scalable softwarebased intrusion detection system
-
M. Jamshed, J. Lee, S. Moon, I. Yun, D. Kim, S. Lee, Y. Yi, and K. Park, "Kargus: a highly-scalable softwarebased intrusion detection system," in Proceedings of the 19th ACM Conference on Computer and Communications Security (CCS), 2012.
-
(2012)
Proceedings of the 19th ACM Conference on Computer and Communications Security (CCS)
-
-
Jamshed, M.1
Lee, J.2
Moon, S.3
Yun, I.4
Kim, D.5
Lee, S.6
Yi, Y.7
Park, K.8
-
12
-
-
85076614343
-
SSLShader: Cheap SSL acceleration with commodity processors
-
K. Jang, S. Han, S. Han, S. Moon, and K. Park, "SSLShader: Cheap SSL acceleration with commodity processors," in Proceedings of the 8th USENIX Symposium on Networked Systems Design and Implementation (NSDI), 2011.
-
(2011)
Proceedings of the 8th USENIX Symposium on Networked Systems Design and Implementation (NSDI)
-
-
Jang, K.1
Han, S.2
Han, S.3
Moon, S.4
Park, K.5
-
13
-
-
33646728555
-
Crypto graphics: Secret key cryptography using graphics cards
-
D. L. Cook, J. Ioannidis, A. D. Keromytis, and J. Luck, "Crypto Graphics: Secret key cryptography using graphics cards," in Proceedings of The Cryptographer's Track at RSA Conference 2005 (CT-RSA), 2005.
-
(2005)
Proceedings of the Cryptographer's Track at RSA Conference 2005 (CT-RSA)
-
-
Cook, D.L.1
Ioannidis, J.2
Keromytis, A.D.3
Luck, J.4
-
18
-
-
84860351763
-
The case for GPGPU spatial multitasking
-
J. T. Adriaens, K. Compton, N. S. Kim, and M. J. Schulte, "The case for GPGPU spatial multitasking," in Proceedings of the 18th IEEE International Conference on High Performance Computer Architecture (HPCA), 2012.
-
(2012)
Proceedings of the 18th IEEE International Conference on High Performance Computer Architecture (HPCA)
-
-
Adriaens, J.T.1
Compton, K.2
Kim, N.S.3
Schulte, M.J.4
-
20
-
-
84914129830
-
-
Khronos, "WebGL security," http://www.khronos.org/webgl/security/.
-
WebGL Security
-
-
-
21
-
-
84889030419
-
Shredding your garbage: Reducing data lifetime through secure deallocation
-
J. Chow, B. Pfaff, T. Garfinkel, and M. Rosenblum, "Shredding your garbage: Reducing data lifetime through secure deallocation," in Proceedings of the 14th USENIX Security Symposium, 2005.
-
(2005)
Proceedings of the 14th USENIX Security Symposium
-
-
Chow, J.1
Pfaff, B.2
Garfinkel, T.3
Rosenblum, M.4
-
22
-
-
85084160792
-
Understanding data lifetime via whole system simulation
-
J. Chow, B. Pfaff, T. Garfinkel, K. Christopher, and M. Rosenblum, "Understanding data lifetime via whole system simulation," in Proceedings of the 13th USENIX Security Symposium, 2004.
-
(2004)
Proceedings of the 13th USENIX Security Symposium
-
-
Chow, J.1
Pfaff, B.2
Garfinkel, T.3
Christopher, K.4
Rosenblum, M.5
-
23
-
-
77951430522
-
Data lifetime is a system problem
-
T. Garfinkel, B. Pfaff, J. Chow, and M. Rosenblum, "Data lifetime is a system problem," in Proceedings of the 11th ACM SIGOPS European Workshop, 2004.
-
(2004)
Proceedings of the 11th ACM SIGOPS European Workshop
-
-
Garfinkel, T.1
Pfaff, B.2
Chow, J.3
Rosenblum, M.4
-
24
-
-
84977840356
-
Eternal sunshine of the spotless machine: Protecting privacy with ephemeral channels
-
A. M. Dunn, M. Z. Lee, S. Jana, S. Kim, M. Silberstein, Y. Xu, V. Shmatikov, and E. Witchel, "Eternal sunshine of the spotless machine: Protecting privacy with ephemeral channels," in Proceedings of the 10th USENIX Symposium on Operating Systems Design and Implementation (OSDI), 2012.
-
(2012)
Proceedings of the 10th USENIX Symposium on Operating Systems Design and Implementation (OSDI)
-
-
Dunn, A.M.1
Lee, M.Z.2
Jana, S.3
Kim, S.4
Silberstein, M.5
Xu, Y.6
Shmatikov, V.7
Witchel, E.8
-
26
-
-
84916634321
-
Confidentiality issues on a GPU in a virtualized environment
-
C. Maurice, C. Neumann, O. Heen, and A. Francillon, "Confidentiality issues on a GPU in a virtualized environment," in Proceedings of the 18th International Conference on Financial Cryptography and Data Security (FC), 2014.
-
(2014)
Proceedings of the 18th International Conference on Financial Cryptography and Data Security (FC)
-
-
Maurice, C.1
Neumann, C.2
Heen, O.3
Francillon, A.4
-
34
-
-
84889014267
-
Crossorigin pixel stealing: Timing attack using CSS filters
-
R. Kotcher, Y. Pei, P. Jumde, and C. Jackson, "Crossorigin pixel stealing: Timing attack using CSS filters," in Proceedings of the 20th ACM Conference on Computer and Communications Security (CCS), 2013.
-
(2013)
Proceedings of the 20th ACM Conference on Computer and Communications Security (CCS)
-
-
Kotcher, R.1
Pei, Y.2
Jumde, P.3
Jackson, C.4
-
35
-
-
84889031935
-
Pixel perfect timing attacks with HTML5
-
P. Stone, "Pixel perfect timing attacks with HTML5," in Blackhat USA, 2013.
-
(2013)
Blackhat USA
-
-
Stone, P.1
-
39
-
-
84914129819
-
You can type, but you can't hide: A stealthy GPU-based keylogger
-
E. Ladakis, L. Koromilas, G. Vasiliadis, M. Polychronakis, and S. Ioannidis, "You can type, but you can't hide: A stealthy GPU-based keylogger," in Proceedings of the 6th European Workshop on System Security (EuroSec), 2013.
-
(2013)
Proceedings of the 6th European Workshop on System Security (EuroSec)
-
-
Ladakis, E.1
Koromilas, L.2
Vasiliadis, G.3
Polychronakis, M.4
Ioannidis, S.5
|