Sciweavers

1015 search results - page 6 / 203
» The data locality of work stealing
Sort
View
PAMI
2012
13 years 2 months ago
Monocular 3D Reconstruction of Locally Textured Surfaces
— Most recent approaches to monocular non-rigid 3D shape recovery rely on exploiting point correspondences and work best when the whole surface is well-textured. The alternative ...
Aydin Varol, Appu Shaji, Mathieu Salzmann, Pascal ...
NETWORKING
2008
15 years 1 months ago
Asset Localization in Data Centers Using WUSB Radios
Asset tracking is a critical problem in modern data centers with modular and easily movable servers. This paper studies a wireless asset tracking solution built using wireless USB ...
Neha Udar, Krishna Kant, R. Viswanathan
EUROSYS
2009
ACM
15 years 8 months ago
Privacy-preserving browser-side scripting with BFlow
Some web sites provide interactive extensions using browser scripts, often without inspecting the scripts to verify that they are benign and bug-free. Others handle users’ con...
Alexander Yip, Neha Narula, Maxwell N. Krohn, Robe...
ICS
1992
Tsinghua U.
15 years 3 months ago
Optimizing for parallelism and data locality
Previous research has used program transformation to introduce parallelism and to exploit data locality. Unfortunately,these twoobjectives have usuallybeen considered independentl...
Ken Kennedy, Kathryn S. McKinley
ICMCS
2006
IEEE
110views Multimedia» more  ICMCS 2006»
15 years 5 months ago
A Video Scrambling Scheme Applicable to Local Region without Data Expansion
Recently, several scrambling techniques have been proposed for video digitally archived. These methods realize efficient processing by partial encryption on MPEG compressed data ...
Makoto Takayama, Kiyoshi Tanaka, Akio Yoneyama, Ya...