Sciweavers

1969 search results - page 286 / 394
» Incremental Processing and Acceptability
Sort
View
ICCAD
2006
IEEE
125views Hardware» more  ICCAD 2006»
16 years 2 months ago
Leveraging protocol knowledge in slack matching
Stalls, due to mis-matches in communication rates, are a major performance obstacle in pipelined circuits. If the rate of data production is faster than the rate of consumption, t...
Girish Venkataramani, Seth Copen Goldstein
CVPR
2010
IEEE
16 years 1 months ago
Noise-Optimal Capture for High Dynamic Range Photography
Taking multiple exposures is a well-established approach both for capturing high dynamic range (HDR) scenes and for noise reduction. But what is the optimal set of photos to captur...
Samuel W. Hasinoff, Frédo Durand, and William T. ...
EDBTW
2010
Springer
16 years 9 days ago
Expressing privacy metrics as one-symbol information
Organizations often need to release microdata without revealing sensitive information. To this scope, data are anonymized and, to assess the quality of the process, various privac...
Michele Bezzi
OZCHI
2009
ACM
16 years 8 days ago
My phone is my keypad: privacy-enhanced PIN-entry on public terminals
More and more services are available on public terminals. Due to their public location and permanent availability, they can easily fall victim to manipulation. These manipulations...
Alexander De Luca, Bernhard Frauendienst, Sebastia...
ACNS
2009
Springer
162views Cryptology» more  ACNS 2009»
16 years 3 days ago
Performance Measurements of Tor Hidden Services in Low-Bandwidth Access Networks
Abstract. Being able to access and provide Internet services anonymously is an important mechanism to ensure freedom of speech in vast parts of the world. Offering location-hidden...
Jörg Lenhard, Karsten Loesing, Guido Wirtz