Sciweavers

3145 search results - page 617 / 629
» Key Improvements to XTR
Sort
View
ISCA
2008
IEEE
185views Hardware» more  ISCA 2008»
14 years 9 months ago
From Speculation to Security: Practical and Efficient Information Flow Tracking Using Speculative Hardware
Dynamic information flow tracking (also known as taint tracking) is an appealing approach to combat various security attacks. However, the performance of applications can severely...
Haibo Chen, Xi Wu, Liwei Yuan, Binyu Zang, Pen-Chu...
90
Voted
COMGEO
2007
ACM
14 years 9 months ago
On incremental rendering of silhouette maps of a polyhedral scene
We consider the problem of incrementally rendering a polyhedral scene while the viewpoint is moving. In practical situations the number of geometric primitives to be rendered can ...
Alon Efrat, Leonidas J. Guibas, Olaf A. Hall-Holt,...
ISJ
2008
93views more  ISJ 2008»
14 years 9 months ago
Knowledge transfer in globally distributed teams: the role of transactive memory
Abstract. This paper explores the role of transactive memory in enabling knowledge transfer between globally distributed teams. While the information systems literature has recentl...
Ilan Oshri, Paul C. van Fenema, Julia Kotlarsky
COMPUTING
2007
122views more  COMPUTING 2007»
14 years 9 months ago
Error estimation for Bregman iterations and inverse scale space methods in image restoration
In this paper we consider error estimation for image restoration problems based on generalized Bregman distances. This error estimation technique has been used to derive convergen...
Martin Burger, E. Resmerita, Lin He
CORR
2007
Springer
117views Education» more  CORR 2007»
14 years 9 months ago
Perfectly Secure Steganography: Capacity, Error Exponents, and Code Constructions
An analysis of steganographic systems subject to the following perfect undetectability condition is presented in this paper. Following embedding of the message into the covertext,...
Ying Wang, Pierre Moulin