Sciweavers

1585 search results - page 296 / 317
» Automatically optimizing secure computation
Sort
View
SCA
2007
14 years 15 days ago
Face poser: interactive modeling of 3D facial expressions using model priors
In this paper, we present an intuitive interface for interactively posing 3D facial expressions. The user can create and edit facial expressions by drawing freeform strokes, or by...
Manfred Lau, Jinxiang Chai, Ying-Qing Xu, Heung-Ye...
MOBIHOC
2005
ACM
14 years 9 months ago
An efficient scheme for authenticating public keys in sensor networks
With the advance of technology, Public Key Cryptography (PKC) will sooner or later be widely used in wireless sensor networks. Recently, it has been shown that the performance of ...
Wenliang Du, Ronghua Wang, Peng Ning
ANCS
2007
ACM
14 years 2 months ago
Towards high-performance flow-level packet processing on multi-core network processors
There is a growing interest in designing high-performance network devices to perform packet processing at flow level. Applications such as stateful access control, deep inspection...
Yaxuan Qi, Bo Xu, Fei He, Baohua Yang, Jianming Yu...
SC
2009
ACM
14 years 4 months ago
Autotuning multigrid with PetaBricks
Algorithmic choice is essential in any problem domain to realizing optimal computational performance. Multigrid is a prime example: not only is it possible to make choices at the ...
Cy P. Chan, Jason Ansel, Yee Lok Wong, Saman P. Am...
SAC
2005
ACM
14 years 3 months ago
Node clustering based on link delay in P2P networks
Peer-to-peer (P2P) has become an important computing model because of its adaptation, self-organization and autonomy etc. But efficient organization of the nodes in P2P networks i...
Wei Zheng, Sheng Zhang, Yi Ouyang, Fillia Makedon,...