Sciweavers

6952 search results - page 7 / 1391
» The information integrity imperative
Sort
View
VR
2008
IEEE
173views Virtual Reality» more  VR 2008»
15 years 4 months ago
Rapid Creation of Large-scale Photorealistic Virtual Environments
The rapid and efficient creation of virtual environments has become a crucial part of virtual reality applications. In particular, civil and defense applications often require an...
Charalambos Poullis, Suya You, Ulrich Neumann
90
Voted
DAC
2004
ACM
15 years 10 months ago
STAC: statistical timing analysis with correlation
Current technology trends have led to the growing impact of both inter-die and intra-die process variations on circuit performance. While it is imperative to model parameter varia...
Jiayong Le, Xin Li, Lawrence T. Pileggi
CCS
2009
ACM
15 years 4 months ago
A security-preserving compiler for distributed programs: from information-flow policies to cryptographic mechanisms
We enforce information flow policies in programs that run at multiple locations, with diverse levels of security. We build a compiler from a small imperative language with locali...
Cédric Fournet, Gurvan Le Guernic, Tamara R...
ACMDIS
2006
ACM
15 years 3 months ago
Storyboarding: an empirical determination of best practices and effective guidelines
Storyboarding is a common technique in HCI and design for demonstrating system interfaces and contexts of use. Despite its recognized benefits, novice designers still encounter ch...
Khai N. Truong, Gillian R. Hayes, Gregory D. Abowd
TCS
2008
14 years 9 months ago
Cryptographically-masked flows
Abstract. Cryptographic operations are essential for many security-critical systems. Reasoning about information flow in such systems is challenging because typical (noninterferenc...
Aslan Askarov, Daniel Hedin, Andrei Sabelfeld