Sciweavers

1661 search results - page 36 / 333
» Advanced carving techniques
Sort
View
SP
2000
IEEE
117views Security Privacy» more  SP 2000»
13 years 12 months ago
Practical Techniques for Searches on Encrypted Data
It is desirable to store data on data storage servers such as mail servers and file servers in encrypted form to reduce security and privacy risks. But this usually implies that ...
Dawn Xiaodong Song, David Wagner, Adrian Perrig
TOG
2012
178views Communications» more  TOG 2012»
11 years 10 months ago
Reconstructing the indirect light field for global illumination
Stochastic techniques for rendering indirect illumination suffer from noise due to the variance in the integrand. In this paper, we describe a general reconstruction technique tha...
Jaakko Lehtinen, Timo Aila, Samuli Laine, Fr&eacut...
USS
2010
13 years 5 months ago
Dude, Where's That IP? Circumventing Measurement-based IP Geolocation
Many applications of IP geolocation can benefit from geolocation that is robust to adversarial clients. These include applications that limit access to online content to a specifi...
Phillipa Gill, Yashar Ganjali, Bernard Wong, David...
CHI
2005
ACM
14 years 8 months ago
A comparison of techniques for multi-display reaching
Recent advances in multi-user collaboration have seen a proliferation of interaction techniques for moving digital objects from one device to another. However, little is known abo...
Miguel A. Nacenta, Dzmitry Aliakseyeu, Sriram Subr...
WEA
2010
Springer
397views Algorithms» more  WEA 2010»
14 years 2 months ago
A New Combinational Logic Minimization Technique with Applications to Cryptology
Abstract. A new technique for combinational logic optimization is described. The technique is a two-step process. In the first step, the nonlinearity of a circuit – as measured ...
Joan Boyar, René Peralta