Sciweavers

549 search results - page 78 / 110
» On the Reading of Tables of Contents
Sort
View
SP
2002
IEEE
110views Security Privacy» more  SP 2002»
13 years 7 months ago
Optical Time-Domain Eavesdropping Risks of CRT Displays
A new eavesdropping technique can be used to read cathode-ray tube (CRT) displays at a distance. The intensity of the light emitted by a raster-scan screen as a function of time c...
Markus G. Kuhn
TOG
2002
148views more  TOG 2002»
13 years 7 months ago
Pointshop 3D: an interactive system for point-based surface editing
We present a system for interactive shape and appearance editing of 3D point-sampled geometry. By generalizing conventional 2D pixel editors, our system supports a great variety o...
Matthias Zwicker, Mark Pauly, Oliver Knoll, Markus...
EKNOW
2009
13 years 5 months ago
The Method for a Summarization of Product Reviews Using the User's Opinion
As the number of transactions in E-market places is growing, more and more product information and product reviews are posted on the Internet. Because customers want to purchase go...
Jung-Yeon Yang, Jaeseok Myung, Sang-goo Lee
FAST
2009
13 years 5 months ago
WorkOut: I/O Workload Outsourcing for Boosting RAID Reconstruction Performance
User I/O intensity can significantly impact the performance of on-line RAID reconstruction due to contention for the shared disk bandwidth. Based on this observation, this paper p...
Suzhen Wu, Hong Jiang, Dan Feng, Lei Tian, Bo Mao
DAC
2009
ACM
14 years 8 months ago
Online cache state dumping for processor debug
Post-silicon processor debugging is frequently carried out in a loop consisting of several iterations of the following two key steps: (i) processor execution for some duration, fo...
Anant Vishnoi, Preeti Ranjan Panda, M. Balakrishna...