Sciweavers

134 search results - page 13 / 27
» ccs 2004
Sort
View
CCS
2004
ACM
14 years 3 months ago
Payload attribution via hierarchical bloom filters
Payload attribution is an important problem often encountered in network forensics. Given an excerpt of a payload, finding its source and destination is useful for many security ...
Kulesh Shanmugasundaram, Hervé Brönnim...
CCS
2009
ACM
14 years 4 months ago
Multi-party off-the-record messaging
Most cryptographic algorithms provide a means for secret and authentic communication. However, under many circumstances, the ability to repudiate messages or deny a conversation i...
Ian Goldberg, Berkant Ustaoglu, Matthew Van Gundy,...
EGH
2004
Springer
14 years 3 months ago
A flexible simulation framework for graphics architectures
In this paper we describe a multipurpose tool for analysis of the performance characteristics of computer graphics hardware and software. We are developing Qsilver, a highly con...
Jeremy W. Sheaffer, David P. Luebke, Kevin Skadron
VISSYM
2004
13 years 11 months ago
Interaction Spaces in Data and Information Visualization
User interaction plays an integral part in the effective visualization of data and information. Typical interaction operations include navigation, selection, and distortion. A pro...
Matthew O. Ward, Jing Yang
CGF
2004
151views more  CGF 2004»
13 years 9 months ago
Deferred Splatting
In recent years it has been shown that, above a certain complexity, points become the most efficient rendering primitives. Although the programmability of the lastest graphics har...
Gaël Guennebaud, Loïc Barthe, Mathias Pa...