Sciweavers

1234 search results - page 126 / 247
» Privacy-preserving Virtual Machine
Sort
View
149
Voted
ATAL
2010
Springer
15 years 4 months ago
Evaluating models of speaker head nods for virtual agents
Virtual human research has often modeled nonverbal behaviors based on the findings of psychological research. In recent years, however, there have been growing efforts to use auto...
Jina Lee, Zhiyang Wang, Stacy Marsella
147
Voted
ISCA
2007
IEEE
149views Hardware» more  ISCA 2007»
15 years 10 months ago
Virtual private caches
Virtual Private Machines (VPM) provide a framework for Quality of Service (QoS) in CMP-based computer systems. VPMs incorporate microarchitecture mechanisms that allow shares of h...
Kyle J. Nesbit, James Laudon, James E. Smith
154
Voted
SMA
2005
ACM
239views Solid Modeling» more  SMA 2005»
15 years 9 months ago
Bender: a virtual ribbon for deforming 3D shapes in biomedical and styling applications
In contrast to machined mechanical parts, the 3D shapes encountered in biomedical or styling applications contain many tubular parts, protrusions, engravings, embossings, folds, a...
Ignacio Llamas, Alexander Powell, Jarek Rossignac,...
GPCE
2009
Springer
15 years 8 months ago
Classifying Java class transformations for pervasive virtualized access
The indirection of object accesses is a common theme for target domains as diverse as transparent distribution, persistence, and program instrumentation. Virtualizing accesses to ...
Phil McGachey, Antony L. Hosking, J. Eliot B. Moss
USENIX
2008
15 years 6 months ago
Protection Strategies for Direct Access to Virtualized I/O Devices
Commodity virtual machine monitors forbid direct access to I/O devices by untrusted guest operating systems in order to provide protection and sharing. However, both I/O memory ma...
Paul Willmann, Scott Rixner, Alan L. Cox