Sciweavers

1585 search results - page 308 / 317
» Automatically optimizing secure computation
Sort
View
CGF
2010
163views more  CGF 2010»
13 years 9 months ago
Meshless Shape and Motion Design for Multiple Deformable Objects
We present physically based algorithms for interactive deformable shape and motion modeling. We coarsely sample the objects with simulation nodes, and apply a meshless finite elem...
Bart Adams, Martin Wicke, Maks Ovsjanikov, Michael...
COLING
2002
13 years 8 months ago
Data-driven Classification of Linguistic Styles in Spoken Dialogues
Language users have individual linguistic styles. A spoken dialogue system may benefit from adapting to the linguistic style of a user in input analysis and output generation. To ...
Thomas Portele
DAC
2009
ACM
14 years 10 months ago
Analysis and mitigation of process variation impacts on Power-Attack Tolerance
Embedded cryptosystems show increased vulnerabilities to implementation attacks such as power analysis. CMOS technology trends are causing increased process variations which impac...
Lang Lin, Wayne P. Burleson
LCTRTS
2009
Springer
14 years 3 months ago
Addressing the challenges of DBT for the ARM architecture
Dynamic binary translation (DBT) can provide security, virtualization, resource management and other desirable services to embedded systems. Although DBT has many benefits, its r...
Ryan W. Moore, José Baiocchi, Bruce R. Chil...
IEEEPACT
2009
IEEE
14 years 3 months ago
SOS: A Software-Oriented Distributed Shared Cache Management Approach for Chip Multiprocessors
Abstract—This paper proposes a new software-oriented approach for managing the distributed shared L2 caches of a chip multiprocessor (CMP) for latency-oriented multithreaded appl...
Lei Jin, Sangyeun Cho