Sciweavers

2354 search results - page 461 / 471
» DRM as a layered system
Sort
View
ECCV
2010
Springer
13 years 11 months ago
Predicting Facial Beauty without Landmarks
A fundamental task in artificial intelligence and computer vision is to build machines that can behave like a human in recognizing a broad range of visual concepts. This paper aims...
SP
2010
IEEE
174views Security Privacy» more  SP 2010»
13 years 11 months ago
HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity
— Virtualization is being widely adopted in today’s computing systems. Its unique security advantages in isolating and introspecting commodity OSes as virtual machines (VMs) ha...
Zhi Wang, Xuxian Jiang
RT
2000
Springer
13 years 11 months ago
Parameterized Animation Compression
Synthetic images can be parameterized by more than time or viewpoint. We generalize image-based rendering by exploiting texture-mapping graphics hardware to decompress ray-traced ...
Ziyad S. Hakura, Jerome Edward Lengyel, John M. Sn...
SIGIR
1995
ACM
13 years 11 months ago
Integrating IR and RDBMS Using Cooperative Indexing
The full integration of information retrieval (IR) features into a database management system (DBMS) has long been recognized as both a significant goal and a challenging undertak...
Samuel DeFazio, Amjad M. Daoud, Lisa Ann Smith, Ja...
NSDI
2008
13 years 9 months ago
Designing and Implementing Malicious Hardware
Hidden malicious circuits provide an attacker with a stealthy attack vector. As they occupy a layer below the entire software stack, malicious circuits can bypass traditional defe...
Samuel T. King, Joseph Tucek, Anthony Cozzie, Chri...