Sciweavers

1147 search results - page 10 / 230
» Transformation of Access Rights
Sort
View
PLDI
1994
ACM
14 years 20 days ago
Memory Access Coalescing: A technique for Eliminating Redundant memory Accesses
As microprocessor speeds increase, memory bandwidth is increasing y the performance bottleneck for microprocessors. This has occurred because innovation and technological improvem...
Jack W. Davidson, Sanjay Jinturkar
PATMOS
2000
Springer
14 years 4 days ago
Data-Reuse and Parallel Embedded Architectures for Low-Power, Real-Time Multimedia Applications
Exploitation of data re-use in combination with the use of custom memory hierarchy that exploits the temporal locality of data accesses may introduce significant power savings, esp...
Dimitrios Soudris, Nikolaos D. Zervas, Antonios Ar...
IPL
2007
104views more  IPL 2007»
13 years 8 months ago
A linear-time algorithm for Euclidean feature transform sets
The Euclidean distance transform of a binary image is the function that assigns to every pixel the Euclidean distance to the background. The Euclidean feature transform is the fun...
Wim H. Hesselink
VR
2008
IEEE
129views Virtual Reality» more  VR 2008»
14 years 3 months ago
Object-Capability Security in Virtual Environments
Access control is an important aspect of shared virtual environments. Resource access may not only depend on prior authorization, but also on context of usage such as distance or ...
Martin Scheffler, Jan P. Springer, Bernd Froehlich
CRYPTO
1998
Springer
109views Cryptology» more  CRYPTO 1998»
14 years 25 days ago
Self-Delegation with Controlled Propagation - or - What If You Lose Your Laptop
We introduce delegation schemes wherein a user may delegate certain rights to himself, but may not safely delegate these rights to others. In our motivating application, a user ha...
Oded Goldreich, Birgit Pfitzmann, Ronald L. Rivest