Sciweavers

232 search results - page 17 / 47
» Twenty Years Later
Sort
View
MIG
2009
Springer
14 years 2 months ago
Exploiting Motion Capture to Enhance Avoidance Behaviour in Games
Abstract. Realistic simulation of interacting virtual characters is essential in computer games, training and simulation applications. The problem is very challenging since people ...
Ben J. H. van Basten, Sander E. M. Jansen, Ioannis...
SIGCOMM
2009
ACM
14 years 2 months ago
Cutting the electric bill for internet-scale systems
Energy expenses are becoming an increasingly important fraction of data center operating costs. At the same time, the energy expense per unit of computation can vary significantl...
Asfandyar Qureshi, Rick Weber, Hari Balakrishnan, ...
PKC
2007
Springer
151views Cryptology» more  PKC 2007»
14 years 1 months ago
Cryptanalysis of HFE with Internal Perturbation
Abstract. Multivariate Cryptography has been an active line of research for almost twenty years. While most multivariate cryptosystems have been under attack, variations of the bas...
Vivien Dubois, Louis Granboulan, Jacques Stern
ACMDIS
2006
ACM
14 years 1 months ago
Supporting ethnographic studies of ubiquitous computing in the wild
Ethnography has become a staple feature of IT research over the last twenty years, shaping our understanding of the social character of computing systems and informing their desig...
Andy Crabtree, Steve Benford, Chris Greenhalgh, Pa...
ISPASS
2005
IEEE
14 years 1 months ago
Balancing Performance and Reliability in the Memory Hierarchy
Cosmic-ray induced soft errors in cache memories are becoming a major threat to the reliability of microprocessor-based systems. In this paper, we present a new method to accurate...
Hossein Asadi, Vilas Sridharan, Mehdi Baradaran Ta...