Sciweavers

318 search results - page 49 / 64
» Using Memory Errors to Attack a Virtual Machine
Sort
View
ICDAR
2009
IEEE
14 years 3 months ago
Online Recognition of Multi-Stroke Symbols with Orthogonal Series
We propose an efficient method to recognize multi-stroke handwritten symbols. The method is based on computing the truncated Legendre-Sobolev expansions of the coordinate functio...
Oleg Golubitsky, Stephen M. Watt
ATAL
2003
Springer
14 years 1 months ago
Authoring scenes for adaptive, interactive performances
In this paper, we introduce a toolkit called SceneMaker for authoring scenes for adaptive, interactive performances. These performances are based on automatically generated and pr...
Patrick Gebhard, Michael Kipp, Martin Klesen, Thom...
ICPADS
2010
IEEE
13 years 6 months ago
Data-Aware Task Scheduling on Multi-accelerator Based Platforms
To fully tap into the potential of heterogeneous machines composed of multicore processors and multiple accelerators, simple offloading approaches in which the main trunk of the ap...
Cédric Augonnet, Jérôme Clet-O...
DRM
2006
Springer
14 years 11 days ago
Securing sensitive content in a view-only file system
One of the most fundamental problems in computer security is protecting sensitive digital information from unauthorized disclosure. There are a number of challenges, such as spywa...
Kevin Borders, Xin Zhao, Atul Prakash
IWMM
2000
Springer
108views Hardware» more  IWMM 2000»
14 years 8 days ago
Implementing an On-the-Fly Garbage Collector for Java
Java uses garbage collection (GC) for the automatic reclamation of computer memory no longer required by a running application. GC implementations for Java Virtual Machines (JVM) ...
Tamar Domani, Elliot K. Kolodner, Ethan Lewis, Eli...