Sciweavers

3531 search results - page 609 / 707
» Virtualizing Disk Performance
Sort
View
SIGMOD
2010
ACM
184views Database» more  SIGMOD 2010»
14 years 1 months ago
Load-balanced query dissemination in privacy-aware online communities
We propose a novel privacy-preserving distributed infrastructure in which data resides only with the publishers owning it. The infrastructure disseminates user queries to publishe...
Emiran Curtmola, Alin Deutsch, K. K. Ramakrishnan,...
ISVC
2009
Springer
14 years 1 months ago
Codebook-Based Background Subtraction to Generate Photorealistic Avatars in a Walkthrough Simulator
Foregrounds extracted from the background, which are intended to be used as photorealistic avatars for simulators in a variety of virtual worlds, should satisfy the following four ...
Anjin Park, Keechul Jung, Takeshi Kurata
CC
2001
Springer
121views System Software» more  CC 2001»
14 years 1 months ago
Constant-Time Root Scanning for Deterministic Garbage Collection
Root scanning is the task of identifying references to heap objects that are stored outside of the heap itself, in global and local variables and on the execution stack. Root scann...
Fridtjof Siebert
CODES
2000
IEEE
14 years 1 months ago
ASDEN: a comprehensive design framework vision for automotive electronic control systems
The automotive electronics industry is experiencing an era of unprecedented growth. Driven by emissions and safety legislation, fuel economy constraints, cost constraints, and cus...
Deborah Wilson, Daniel Dayton, R. Todd Hansell
CVPR
2000
IEEE
14 years 1 months ago
Segmentation with Invisible Keying Signal
Croma keying is the process of segmenting objects from images and video using color cues. A blue (or green) screen placed behind an object during recording is used in special effe...
Moshe Ben-Ezra