Sciweavers

604 search results - page 78 / 121
» Efficient Computation of Multiplicative Inverses for Cryptog...
Sort
View
ESORICS
2009
Springer
14 years 8 months ago
Cumulative Attestation Kernels for Embedded Systems
1 There are increasing deployments of networked embedded systems and rising threats of malware intrusions on such systems. To mitigate this threat, it is desirable to enable common...
Michael LeMay, Carl A. Gunter
ICPADS
2010
IEEE
13 years 5 months ago
Data-Aware Task Scheduling on Multi-accelerator Based Platforms
To fully tap into the potential of heterogeneous machines composed of multicore processors and multiple accelerators, simple offloading approaches in which the main trunk of the ap...
Cédric Augonnet, Jérôme Clet-O...
CVPR
2005
IEEE
14 years 9 months ago
Multitarget Tracking with Split and Merged Measurements
In many multitarget tracking applications in computer vision, a detection algorithm provides locations of potential targets. Subsequently, the measurements are associated with pre...
Zia Khan, Tucker R. Balch, Frank Dellaert
PET
2010
Springer
13 years 11 months ago
Collaborative, Privacy-Preserving Data Aggregation at Scale
Combining and analyzing data collected at multiple locations is critical for a wide variety of applications, such as detecting and diagnosing malicious attacks or computing an acc...
Benny Applebaum, Haakon Ringberg, Michael J. Freed...
ECCV
2006
Springer
14 years 9 months ago
A Theory of Spherical Harmonic Identities for BRDF/Lighting Transfer and Image Consistency
Abstract. We develop new mathematical results based on the spherical harmonic convolution framework for reflection from a curved surface. We derive novel identities, which are the ...
Dhruv Mahajan, Ravi Ramamoorthi, Brian Curless