We propose an execution model that orchestrates the fine-grained interaction of a conventional general-purpose processor (GPP) and a high-speed reconfigurable hardware accelerator ...
Use-after-free vulnerabilities are rapidly growing in popularity, especially for exploiting web browsers. Use-afterfree (and double-free) vulnerabilities are caused by a program o...
Juan Caballero, Gustavo Grieco, Mark Marron, Anton...
Kernel summations are a ubiquitous key computational bottleneck in many data analysis methods. In this paper, we attempt to marry, for the first time, the best relevant technique...
Dongryeol Lee, Richard W. Vuduc, Alexander G. Gray
This paper presents a novel approach for creating curvilinear, texture mapped, 3D scene models from a single painting or photograph with no prior internal knowledge about the shap...
View-dependentsimplification has emerged as a powerful tool for graphics acceleration in visualization of complex environments. However, view-dependent simplification techniques h...