Sciweavers

1816 search results - page 60 / 364
» Trace oblivious computation
Sort
View
NDSS
2007
IEEE
15 years 5 months ago
Playing Devil's Advocate: Inferring Sensitive Information from Anonymized Network Traces
Encouraging the release of network data is central to promoting sound network research practices, though the publication of this data can leak sensitive information about the publ...
Scott E. Coull, Charles V. Wright, Fabian Monrose,...
3DPVT
2006
IEEE
140views Visualization» more  3DPVT 2006»
15 years 5 months ago
Carving from Ray-Tracing Constraints: IRT-Carving
We present a new algorithm for improving an available (conservative) estimate of the shape of an object using constraints from ray-tracing. In particular, we exploit incoherences ...
Marco Andreetto, Silvio Savarese, Pietro Perona
HPDC
2003
IEEE
15 years 4 months ago
Trace-Based Simulations of Processor Co-Allocation Policies in Multiclusters
In systems consisting of multiple clusters of processors which employ space sharing for scheduling jobs, such as our Distributed ASCI1 Supercomputer (DAS), coallocation, i.e., the...
Anca I. D. Bucur, Dick H. J. Epema
TVCG
2008
128views more  TVCG 2008»
14 years 11 months ago
AD-Frustum: Adaptive Frustum Tracing for Interactive Sound Propagation
We present an interactive algorithm to compute sound propagation paths for transmission, specular reflection and edge diffraction in complex scenes. Our formulation uses an adaptiv...
Anish Chandak, Christian Lauterbach, Micah T. Tayl...
MINENET
2006
ACM
15 years 5 months ago
SC2D: an alternative to trace anonymization
Progress in networking research depends crucially on applying novel analysis tools to real-world traces of network activity. This often conflicts with privacy and security requir...
Jeffrey C. Mogul, Martin F. Arlitt