Sciweavers

2956 search results - page 504 / 592
» Targeted Data Prefetching
Sort
View
118
Voted
IACR
2011
149views more  IACR 2011»
14 years 2 months ago
Public Key Encryption for the Forgetful
We investigate public key encryption that allows the originator of a ciphertext to retrieve a “forgotten” plaintext from the ciphertext. This type of public key encryption wit...
Puwen Wei, Yuliang Zheng, Xiaoyun Wang
127
Voted
ASPLOS
2004
ACM
15 years 8 months ago
Secure program execution via dynamic information flow tracking
Dynamic information flow tracking is a hardware mechanism to protect programs against malicious attacks by identifying spurious information flows and restricting the usage of sp...
G. Edward Suh, Jae W. Lee, David Zhang, Srinivas D...
194
Voted
ICDCSW
2011
IEEE
14 years 2 months ago
Cross-Examination of Datacenter Workload Modeling Techniques
Datacenter workload modeling has become a necessity in recent years due to the emergence of large-scale applications and cloud data-stores, whose implementation remains largely un...
Christina Delimitrou, Christos Kozyrakis
175
Voted
TOG
2012
279views Communications» more  TOG 2012»
13 years 5 months ago
Sketch-based shape retrieval
We develop a system for 3D object retrieval based on sketched feature lines as input. For objective evaluation, we collect a large number of query sketches from human users that a...
Mathias Eitz, Ronald Richter, Tamy Boubekeur, Kris...
158
Voted
CVPR
2012
IEEE
13 years 5 months ago
Teaching 3D geometry to deformable part models
Current object class recognition systems typically target 2D bounding box localization, encouraged by benchmark data sets, such as Pascal VOC. While this seems suitable for the de...
Bojan Pepik, Michael Stark, Peter V. Gehler, Bernt...