Sciweavers

2880 search results - page 573 / 576
» Types are calling conventions
Sort
View
VR
2011
IEEE
309views Virtual Reality» more  VR 2011»
14 years 1 months ago
Two-handed tangible interaction techniques for composing augmented blocks
Abstract Modeling tools typically have their own interaction methods for combining virtual objects. For realistic composition in 3D space, many researchers from the fields of virt...
Hyeongmook Lee, Mark Billinghurst, Woontack Woo
ASPLOS
2011
ACM
14 years 1 months ago
NV-Heaps: making persistent objects fast and safe with next-generation, non-volatile memories
nt, user-defined objects present an attractive abstraction for working with non-volatile program state. However, the slow speed of persistent storage (i.e., disk) has restricted ...
Joel Coburn, Adrian M. Caulfield, Ameen Akel, Laur...
INFOCOM
2011
IEEE
14 years 1 months ago
Aggregation capacity of wireless sensor networks: Extended network case
—A critical function of wireless sensor networks (WSNs) is data gathering. While, one is often only interested in collecting a relevant function of the sensor measurements at a s...
Cheng Wang, Changjun Jiang, Yunhao Liu, Xiang-Yang...
INFOCOM
2011
IEEE
14 years 1 months ago
Adaptive wireless channel probing for shared key generation
—Generating a shared key between two parties from the wireless channel is of increasing interest. The procedure for obtaining information from wireless channel is called channel ...
Yunchuan Wei, Kai Zeng, Prasant Mohapatra
PKC
2011
Springer
219views Cryptology» more  PKC 2011»
14 years 19 days ago
Linearly Homomorphic Signatures over Binary Fields and New Tools for Lattice-Based Signatures
ded abstract of this work appears in Public Key Cryptography — PKC 2011, ed. R. Gennaro, Springer LNCS 6571 (2011), 1–16. This is the full version. We propose a linearly homom...
Dan Boneh, David Mandell Freeman