Sciweavers

860 search results - page 151 / 172
» Completeness in two-party secure computation: a computationa...
Sort
View
BIRTHDAY
2003
Springer
15 years 3 months ago
Spatial Data Management for Virtual Product Development
Abstract: In the automotive and aerospace industry, millions of technical documents are generated during the development of complex engineering products. Particularly, the universa...
Hans-Peter Kriegel, Martin Pfeifle, Marco Pöt...
IACR
2011
86views more  IACR 2011»
13 years 9 months ago
Protecting Drive Encryption Systems Against Memory Attacks
Software drive encryption systems are vulnerable to memory attacks, in which an attacker gains physical accesses to the unattended computer, obtains the decryption keys from memor...
Leo Dorrendorf
RTSS
2006
IEEE
15 years 3 months ago
Process-Aware Interrupt Scheduling and Accounting
In most operating systems, the handling of interrupts is typically performed within the address space of the kernel. Moreover, interrupt handlers are invoked asynchronously during...
Yuting Zhang, Richard West
STOC
2010
ACM
176views Algorithms» more  STOC 2010»
15 years 2 months ago
Complexity Theory for Operators in Analysis
We propose a new framework for discussing computational complexity of problems involving uncountably many objects, such as real numbers, sets and functions, that can be represente...
Akitoshi Kawamura and Stephen Cook
CVPR
1998
IEEE
15 years 11 months ago
Integrated Person Tracking Using Stereo, Color, and Pattern Detection
We present an approach to real-time person tracking in crowded and/or unknown environments using multi-modal integration. We combine stereo, color, and face detection modules into...
Trevor Darrell, Gaile G. Gordon, Michael Harville,...