Sciweavers

1053 search results - page 27 / 211
» Shape as Memory Storage
Sort
View
CRYPTO
2007
Springer
145views Cryptology» more  CRYPTO 2007»
14 years 1 months ago
Secure Identification and QKD in the Bounded-Quantum-Storage Model
We consider the problem of secure identification: user U proves to server S that he knows an agreed (possibly low-entropy) password w, while giving away as little information on w ...
Ivan Damgård, Serge Fehr, Louis Salvail, Chr...
CHI
2009
ACM
14 years 10 months ago
Conversation clusters: grouping conversation topics through human-computer dialog
Conversation Clusters explores the use of visualization to highlight salient moments of live conversation while archiving a meeting. Cheaper storage and easy access to recording d...
Tony Bergstrom, Karrie Karahalios
TOG
2002
102views more  TOG 2002»
13 years 9 months ago
Hierarchical pattern mapping
We present a multi-scale algorithm for mapping a texture defined by an input image onto an arbitrary surface. It avoids the generation and storage of a new, specific texture. The ...
Cyril Soler, Marie-Paule Cani, Alexis Angelidis
DATE
2008
IEEE
85views Hardware» more  DATE 2008»
14 years 4 months ago
Video Processing Requirements on SoC Infrastructures
Applications from the embedded consumer domain put challenging requirements on SoC infrastructures, i.e. interconnect and memory. Specifically, video applications demand large sto...
Pieter van der Wolf, Tomas Henriksson
VMCAI
2010
Springer
14 years 7 months ago
Shape Analysis of Low-Level C with Overlapping Structures
Abstract. Device drivers often keep data in multiple data structures simultaneously while embedding list or tree related records into the records containing the actual data; this r...
Jörg Kreiker, Helmut Seidl, Vesal Vojdani