Sciweavers

3147 search results - page 151 / 630
» Statistically Hiding Sets
Sort
View
ICDE
2009
IEEE
134views Database» more  ICDE 2009»
14 years 12 months ago
Non-Exposure Location Anonymity
Location cloaking has been proposed and well studied to protect user privacy. It blurs the accurate user location (i.e., a point with coordinates) and replaces it with a well-shape...
Haibo Hu, Jianliang Xu
VIS
2007
IEEE
169views Visualization» more  VIS 2007»
14 years 11 months ago
Transform Coding for Hardware-accelerated Volume Rendering
Hardware-accelerated volume rendering using the GPU is now the standard approach for real-time volume rendering, although limited graphics memory can present a problem when renderi...
Nathaniel Fout, Kwan-Liu Ma
MICCAI
2004
Springer
14 years 11 months ago
A Data Clustering and Streamline Reduction Method for 3D MR Flow Vector Field Simplification
Abstract. With the increasing capability of MR imaging and Computational Fluid Dynamics (CFD) techniques, a significant amount of data related to the haemodynamics of the cardiovas...
Bernardo Silva Carmo, Yin-Heung Pauline Ng, Adam P...
ICCD
2006
IEEE
92views Hardware» more  ICCD 2006»
14 years 7 months ago
Fast Speculative Address Generation and Way Caching for Reducing L1 Data Cache Energy
— L1 data caches in high-performance processors continue to grow in set associativity. Higher associativity can significantly increase the cache energy consumption. Cache access...
Dan Nicolaescu, Babak Salamat, Alexander V. Veiden...
SOSP
2007
ACM
14 years 7 months ago
Sinfonia: a new paradigm for building scalable distributed systems
We propose a new paradigm for building scalable distributed systems. Our approach does not require dealing with message-passing protocols—a major complication in existing distri...
Marcos Kawazoe Aguilera, Arif Merchant, Mehul A. S...