Sciweavers

801 search results - page 88 / 161
» Implementation and Use of Transactional Memory with Dynamic ...
Sort
View
CCS
2009
ACM
15 years 4 months ago
Anonymous credentials on a standard java card
Secure identity tokens such as Electronic Identity (eID) cards are emerging everywhere. At the same time usercentric identity management gains acceptance. Anonymous credential sch...
Patrik Bichsel, Jan Camenisch, Thomas Groß, ...
IEEEARES
2009
IEEE
15 years 4 months ago
Defeating Dynamic Data Kernel Rootkit Attacks via VMM-Based Guest-Transparent Monitoring
—Targeting the operating system kernel, the core of trust in a system, kernel rootkits are able to compromise the entire system, placing it under malicious control, while eluding...
Junghwan Rhee, Ryan Riley, Dongyan Xu, Xuxian Jian...
GRAPHITE
2007
ACM
15 years 1 months ago
Compact and efficient generation of radiance transfer for dynamically articulated characters
We present a data-driven technique for generating the precomputed radiance transfer vectors of an animated character as a function of its joint angles. We learn a linear model for...
Derek Nowrouzezahrai, Patricio D. Simari, Evangelo...
CVPR
2004
IEEE
15 years 11 months ago
Dynamic Geodesic Snakes for Visual Tracking
Visual tracking using active contours is usually accomplished in a static framework. The active contour tracks the object of interest in a given frame of an image sequence, and th...
Marc Niethammer, Allen Tannenbaum
SC
2005
ACM
15 years 3 months ago
Making Sequential Consistency Practical in Titanium
The memory consistency model in parallel programming controls the order in which operations performed by one thread may be observed by another. Language designers have been reluct...
Amir Kamil, Jimmy Su, Katherine A. Yelick