Sciweavers

1816 search results - page 56 / 364
» Trace oblivious computation
Sort
View
ICCSA
2007
Springer
15 years 5 months ago
Tracing Illegal Users of Video: Reconsideration of Tree-Specific and Endbuyer-Specific Methods
In our recent study, we have presented an approach for tracing illegal users in content distribution networks using watermarking and fingerprinting techniques [1][2]. In this paper...
Hyun-Ho Kang, Brian M. Kurkoski, Kazuhiko Yamaguch...
NETCOOP
2007
Springer
15 years 5 months ago
Tracing an Optical Buffer's Performance: An Effective Approach
Abstract. Optical Burst Switching proposes a future-proof alternative to the current electronic switching in the backbone. The involved optical buffers are implemented with a set o...
Wouter Rogiest, Dieter Fiems, Koenraad Laevens, He...
HPCA
2000
IEEE
15 years 3 months ago
Decoupled Value Prediction on Trace Processors
Value prediction is a technique that breaks true data dependences by predicting the outcome of an instruction, and executes speculatively its data-dependent instructions based on ...
Sang Jeong Lee, Yuan Wang, Pen-Chung Yew
SIGGRAPH
1989
ACM
15 years 3 months ago
Ray tracing deterministic 3-D fractals
As shown in 1982, Julia sets of quadratic functions as well as many other deterministic fractals exist in spaces of higher dimensionality than the complex plane. Originally a boun...
John C. Hart, Daniel J. Sandin, Louis H. Kauffman
ACSC
2006
IEEE
15 years 2 months ago
Tracing secure information flow through mode changes
Communications devices intended for use in securitycritical applications must be rigorously evaluated to ensure they preserve data confidentiality. This process includes tracing t...
Colin J. Fidge, Tim McComb