Sciweavers

860 search results - page 140 / 172
» Completeness in two-party secure computation: a computationa...
Sort
View

Publication
267views
15 years 6 months ago
Interactive planar reconstruction of objects and scenes
3D reconstruction from 2D images is an active research topic in the computer vision community. Classical algorithms like Structure From Motion (SFM) and Multi-View Stereo (MVS) are...
Adarsh Kowdle, Yao-Jen Chang, Tsuhan Chen
CHI
2006
ACM
15 years 10 months ago
Attention funnel: omnidirectional 3D cursor for mobile augmented reality platforms
The attention funnel is a general purpose AR interface technique that interactively guides the attention of a user to any object, person, or place in space. The technique utilizes...
Frank Biocca, Arthur Tang, Charles B. Owen, Fan Xi...
FCCM
1998
IEEE
149views VLSI» more  FCCM 1998»
15 years 2 months ago
Configuration Compression for the Xilinx XC6200 FPGA
One of the major overheads in reconfigurable computing is the time it takes to reconfigure the devices in the system. This overhead limits the speedups possible in this exciting n...
Scott Hauck, Zhiyuan Li, Eric J. Schwabe
TCC
2009
Springer
167views Cryptology» more  TCC 2009»
15 years 10 months ago
Simultaneous Hardcore Bits and Cryptography against Memory Attacks
This paper considers two questions in cryptography. Cryptography Secure Against Memory Attacks. A particularly devastating side-channel attack against cryptosystems, termed the &qu...
Adi Akavia, Shafi Goldwasser, Vinod Vaikuntanathan
ACSAC
2005
IEEE
15 years 3 months ago
Automated and Safe Vulnerability Assessment
As the number of system vulnerabilities multiplies in recent years, vulnerability assessment has emerged as a powerful system security administration tool that can identify vulner...
Fanglu Guo, Yang Yu, Tzi-cker Chiueh