Sciweavers

1247 search results - page 213 / 250
» A Multi-User Virtual Machine
Sort
View
USS
2008
15 years 4 months ago
Towards Application Security on Untrusted Operating Systems
Complexity in commodity operating systems makes compromises inevitable. Consequently, a great deal of work has examined how to protect security-critical portions of applications f...
Dan R. K. Ports, Tal Garfinkel
106
Voted
ECOOP
2008
Springer
15 years 3 months ago
Online Phase-Adaptive Data Layout Selection
Good data layouts improve cache and TLB performance of object-oriented software, but unfortunately, selecting an optimal data layout a priori is NP-hard. This paper introduces layo...
Chengliang Zhang, Martin Hirzel
112
Voted
ESORICS
2008
Springer
15 years 3 months ago
Sharemind: A Framework for Fast Privacy-Preserving Computations
Gathering and processing sensitive data is a difficult task. In fact, there is no common recipe for building the necessary information systems. In this paper, we present a provably...
Dan Bogdanov, Sven Laur, Jan Willemson
ARCSF
2008
15 years 3 months ago
Probabilistic Prediction of Student Affect from Hand Gestures
Abstract-- Affective information is vital for effective human-tohuman communication. Likewise, human-to-computer communication could be potentiated by an "affective barometer&...
Abdul Rehman Abbasi, Matthew N. Dailey, Nitin V. A...
DAGSTUHL
2010
15 years 3 months ago
Pre-operative Planning and Intra-operative Guidance for Shoulder Replacement Surgery
Shoulder joint replacement, or arthroplasty, is indicated in cases where arthritis or trauma has resulted in severe joint damage that in turn causes increased pain and decreased f...
Charl P. Botha, Peter R. Krekel, Edward R. Valstar...