Sciweavers

813 search results - page 80 / 163
» desire 2010
Sort
View
SYSTOR
2010
ACM
14 years 15 days ago
Design and implementation of a generic resource sharing virtual time dispatcher
Virtual machine monitors, especially when used for server consolidation, need to enforce a predefined sharing of resources among the running virtual machines. We propose a new me...
Tal Ben-Nun, Yoav Etsion, Dror G. Feitelson
ACNS
2010
Springer
200views Cryptology» more  ACNS 2010»
14 years 15 days ago
Deniable Internet Key Exchange
In this work, we develop a family of protocols for deniable Internet Key-Exchange (IKE) with the following properties: • Highly practical efficiency, and conceptual simplicity a...
Andrew Chi-Chih Yao, Yunlei Zhao
SIGGRAPH
2010
ACM
14 years 5 days ago
Apparent layer operations for the manipulation of deformable objects
We introduce layer operations for single-view 3D deformable object manipulation, in which the user can control the depth order of layered 3D objects resting on a flat ground with...
Takeo Igarashi, Jun Mitani
SIGGRAPH
2010
ACM
14 years 5 days ago
Feature-aligned T-meshes
High-order and regularly sampled surface representations are more efficient and compact than general meshes and considerably simplify many geometric modeling and processing algor...
Ashish Myles, Nico Pietroni, Denis Kovacs, Denis Z...
IEEEARES
2010
IEEE
14 years 1 days ago
Supporting Authorization Policy Modification in Agile Development of Web Applications
Web applications are increasingly developed in Agile development processes. Business-centric Web applications need complex authorization policies to securely implement business pro...
Steffen Bartsch