Sciweavers

5344 search results - page 905 / 1069
» Privacy-Preserving Set Operations
Sort
View
130
Voted
IACR
2011
86views more  IACR 2011»
14 years 3 months ago
Protecting Drive Encryption Systems Against Memory Attacks
Software drive encryption systems are vulnerable to memory attacks, in which an attacker gains physical accesses to the unattended computer, obtains the decryption keys from memor...
Leo Dorrendorf
151
Voted
TOG
2012
297views Communications» more  TOG 2012»
13 years 6 months ago
Adaptive manifolds for real-time high-dimensional filtering
We present a technique for performing high-dimensional filtering of images and videos in real time. Our approach produces high-quality results and accelerates filtering by compu...
Eduardo S. L. Gastal, Manuel M. Oliveira
129
Voted
TVCG
2012
205views Hardware» more  TVCG 2012»
13 years 6 months ago
A Deformable Surface Model for Real-Time Water Drop Animation
—A water drop behaves differently from a large water body because of its strong viscosity and surface tension under the small scale. Surface tension causes the motion of a water ...
Yizhong Zhang, Huamin Wang, Shuai Wang, Yiying Ton...
132
Voted
OSDI
2004
ACM
16 years 3 months ago
Improving the Reliability of Internet Paths with One-hop Source Routing
Recent work has focused on increasing availability in the face of Internet path failures. To date, proposed solutions have relied on complex routing and pathmonitoring schemes, tr...
P. Krishna Gummadi, Harsha V. Madhyastha, Steven D...
ASIACRYPT
2003
Springer
15 years 8 months ago
Incremental Multiset Hash Functions and Their Application to Memory Integrity Checking
We introduce a new cryptographic tool: multiset hash functions. Unlike standard hash functions which take strings as input, multiset hash functions operate on multisets (or sets). ...
Dwaine E. Clarke, Srinivas Devadas, Marten van Dij...