Sciweavers

1619 search results - page 279 / 324
» Important Moments in Systems and Control
Sort
View
FCSC
2010
170views more  FCSC 2010»
13 years 6 months ago
Formal verification of concurrent programs with read-write locks
Abstract Read-write locking is an important mechanism to improve concurrent granularity, but it is difficult to reason about the safety of concurrent programs with read-write locks...
Ming Fu, Yu Zhang, Yong Li
TVCG
2011
182views more  TVCG 2011»
13 years 3 months ago
Directing Crowd Simulations Using Navigation Fields
—We present a novel approach to direct and control virtual crowds using navigation fields. Our method guides one or more agents towards desired goals based on guidance fields. ...
Sachin Patil, Jur P. van den Berg, Sean Curtis, Mi...
MOBISYS
2011
ACM
12 years 11 months ago
ProxiMate: proximity-based secure pairing using ambient wireless signals
Forming secure associations between wireless devices that do not share a prior trust relationship is an important problem. This paper presents ProxiMate, a system that allows wire...
Suhas Mathur, Robert C. Miller, Alexander Varshavs...
CSFW
2011
IEEE
12 years 8 months ago
Modular Protections against Non-control Data Attacks
—This paper introduces YARRA, a conservative extension to C to protect applications from non-control data attacks. YARRA programmers specify their data integrity requirements by ...
Cole Schlesinger, Karthik Pattabiraman, Nikhil Swa...
CVPR
2012
IEEE
11 years 11 months ago
A line-structure-preserving approach to image resizing
This paper proposes a content-aware image resizing method which simultaneously preserves both salient image features and important line structure properties: parallelism, collinea...
Che-Han Chang, Yung-Yu Chuang