Sciweavers

809 search results - page 156 / 162
» Differential Point Rendering
Sort
View
MICRO
2008
IEEE
137views Hardware» more  MICRO 2008»
14 years 4 months ago
Tradeoffs in designing accelerator architectures for visual computing
Visualization, interaction, and simulation (VIS) constitute a class of applications that is growing in importance. This class includes applications such as graphics rendering, vid...
Aqeel Mahesri, Daniel R. Johnson, Neal C. Crago, S...
NDSS
2008
IEEE
14 years 4 months ago
Analysis-Resistant Malware
Traditionally, techniques for computing on encrypted data have been proposed with privacy preserving applications in mind. Several current cryptosystems support a homomorphic oper...
John Bethencourt, Dawn Song, Brent Waters
ICMCS
2006
IEEE
120views Multimedia» more  ICMCS 2006»
14 years 3 months ago
Video Encoding and Splicing for Tune-in Time Reduction in IP Datacasting (IPDC) Over DVB-H
A novel video encoding and splicing method is proposed which minimizes the tune-in time of “channel zapping”, i.e. changing from one audiovisual service to another, in IPDC ov...
Mehdi Rezaei, Miska M. Hannuksela, Moncef Gabbouj
ISMAR
2006
IEEE
14 years 3 months ago
Online camera pose estimation in partially known and dynamic scenes
One of the key requirements of augmented reality systems is a robust real-time camera pose estimation. In this paper we present a robust approach, which does neither depend on of...
Gabriele Bleser, Harald Wuest, Didier Stricker
ACSAC
2005
IEEE
14 years 3 months ago
Stealth Breakpoints
Microscopic analysis of malicious code (malware) requires the aid of a variety of powerful tools. Chief among them is a debugger that enables runtime binary analysis at an instruc...
Amit Vasudevan, Ramesh Yerraballi