Sciweavers

17082 search results - page 3302 / 3417
» Abstractions for Mobile Computation
Sort
View
148
Voted
PPOPP
2012
ACM
13 years 11 months ago
A speculation-friendly binary search tree
We introduce the first binary search tree algorithm designed for speculative executions. Prior to this work, tree structures were mainly designed for their pessimistic (non-specu...
Tyler Crain, Vincent Gramoli, Michel Raynal
WONS
2012
IEEE
13 years 11 months ago
Challenges and implications of using ultrasonic communications in intra-body area networks
Abstract— Body area networks (BANs) promise to enable revolutionary biomedical applications by wirelessly interconnecting devices implanted or worn by humans. However, BAN wirele...
Laura Galluccio, Tommaso Melodia, Sergio Palazzo, ...
145
Voted
TOG
2012
258views Communications» more  TOG 2012»
13 years 6 months ago
Stitch meshes for modeling knitted clothing with yarn-level detail
ike abstraction of the yarn model; (c) then, we specify the desired knitting pattern over the stitch mesh’s surface. (d) Following the interactive modeling process, the model goe...
Cem Yuksel, Jonathan M. Kaldor, Doug L. James, Ste...
207
Voted
CVPR
2012
IEEE
13 years 6 months ago
A learning-based framework for depth ordering
Depth ordering is instrumental for understanding the 3D geometry of an image. We as humans are surprisingly good ordering even with abstract 2D line drawings. In this paper we pro...
Zhaoyin Jia, Andrew C. Gallagher, Yao-Jen Chang, T...
151
Voted
PKC
2012
Springer
235views Cryptology» more  PKC 2012»
13 years 6 months ago
Improved Security for Linearly Homomorphic Signatures: A Generic Framework
ded abstract of this work will appear in Public Key Cryptography — PKC 2012. This is the full version. We propose a general framework that converts (ordinary) signature schemes ...
David Mandell Freeman
« Prev « First page 3302 / 3417 Last » Next »