Sciweavers

1096 search results - page 133 / 220
» Computation Slicing: Techniques and Theory
Sort
View
STORAGESS
2005
ACM
14 years 2 months ago
Security of erasable memories against adaptive adversaries
We study cryptographic modeling and encryption-based design techniques for guaranteeing privacy of data that is first stored in some type of computer memory and then deleted. We ...
Giovanni Di Crescenzo
SCALESPACE
2005
Springer
14 years 2 months ago
Regularity and Scale-Space Properties of Fractional High Order Linear Filtering
We investigate the use of fractional powers of the Laplacian for signal and image simplification. We focus both on their corresponding variational techniques and parabolic pseudod...
Stephan Didas, Bernhard Burgeth, Atsushi Imiya, Jo...
CSCW
2004
ACM
14 years 2 months ago
Retrofitting collaboration into UIs with aspects
Mission critical applications and legacy systems may be difficult to revise and rebuild, and yet it is sometimes desirable to retrofit their user interfaces with new collaborative...
Li-Te Cheng, Steven L. Rohall, John F. Patterson, ...
IMC
2004
ACM
14 years 2 months ago
Identifying elephant flows through periodically sampled packets
Identifying elephant flows is very important in developing effective and efficient traffic engineering schemes. In addition, obtaining the statistics of these flows is also ver...
Tatsuya Mori, Masato Uchida, Ryoichi Kawahara, Jia...
HAPTICS
2003
IEEE
14 years 2 months ago
Dynamic Local Models for Stable Multi-Contact Haptic Interaction with Deformable Objects
This paper describes a new technique for allowing multiple users to haptically interact with a set of deformable slowly-simulated objects in a stable manner. Stability has been ap...
Federico Barbagli, John Kenneth Salisbury Jr., Dom...