Sciweavers

456 search results - page 85 / 92
» Speculation in elastic systems
Sort
View
ETRA
2010
ACM
178views Biometrics» more  ETRA 2010»
14 years 23 days ago
Biometric identification via an oculomotor plant mathematical model
There has been increased interest in reliable, non-intrusive methods of biometric identification due to the growing emphasis on security and increasing prevalence of identity thef...
Oleg V. Komogortsev, Sampath Jayarathna, Cecilia R...
SIGGRAPH
2000
ACM
13 years 11 months ago
Interactive manipulation of rigid body simulations
Physical simulation of dynamic objects has become commonplace in computer graphics because it produces highly realistic animations. In this paradigm the animator provides few phys...
Jovan Popovic, Steven M. Seitz, Michael Erdmann, Z...
RTAS
1998
IEEE
13 years 11 months ago
End-Host Architecture for QoS-Adaptive Communication
Proliferation of communication-intensive real-time applications with elastic" timeliness constraints, such as streaming stored video, requires a new design for endhost commun...
Tarek F. Abdelzaher, Kang G. Shin
CF
2004
ACM
14 years 27 days ago
Repairing return address stack for buffer overflow protection
Although many defense mechanisms against buffer overflow attacks have been proposed, buffer overflow vulnerability in software is still one of the most prevalent vulnerabilities e...
Yong-Joon Park, Gyungho Lee
IEEEPACT
2003
IEEE
14 years 22 days ago
Constraint Graph Analysis of Multithreaded Programs
This paper presents a framework for analyzing the performance of multithreaded programs using a model called a constraint graph. We review previous constraint graph definitions fo...
Harold W. Cain, Mikko H. Lipasti, Ravi Nair