Sciweavers

34 search results - page 6 / 7
» Digital Face Makeup by Example
Sort
View
EUROSYS
2008
ACM
14 years 5 months ago
Protectit: trusted distributed services operating on sensitive data
Protecting shared sensitive information is a key requirement for today’s distributed applications. Our research uses virtualization technologies to create and maintain trusted d...
Jiantao Kong, Karsten Schwan, Min Lee, Mustaque Ah...
SYSTOR
2009
ACM
14 years 3 months ago
DHIS: discriminating hierarchical storage
A typical storage hierarchy comprises of components with varying performance and cost characteristics, providing multiple options for data placement. We propose and evaluate a hie...
Chaitanya Yalamanchili, Kiron Vijayasankar, Erez Z...
IAT
2006
IEEE
14 years 2 months ago
Engaging in a Conversation with Synthetic Agents along the Virtuality Continuum
Abstract During the last decade research groups as well as a number of commercial software developers have started to deploy embodied conversational characters in the user interfac...
Elisabeth André
SI3D
2003
ACM
14 years 1 months ago
User-controlled creation of multiresolution meshes
We present a tool for the user-controlled creation of multiresolution meshes. Several automatic mesh reduction methods of high quality have been presented in the past, but most of...
Erik Pojar, Dieter Schmalstieg
POPL
2000
ACM
14 years 27 days ago
Enforcing Trace Properties by Program Transformation
We propose an automatic method to enforce trace properties on programs. The programmer specifies the property separately from the program; a program transformer takes the program...
Thomas Colcombet, Pascal Fradet