Sciweavers

699 search results - page 132 / 140
» mc 2008
Sort
View
EUROSYS
2008
ACM
14 years 3 months ago
Flicker: an execution infrastructure for tcb minimization
We present Flicker, an infrastructure for executing securitysensitive code in complete isolation while trusting as few as 250 lines of additional code. Flicker can also provide me...
Jonathan M. McCune, Bryan Parno, Adrian Perrig, Mi...
CIS
2008
Springer
14 years 26 days ago
Multiperspective Modeling and Rendering Using General Linear Cameras
We present a General Linear Camera (GLC) model that unifies many previous camera models into a single representation. The GLC model is capable of describing all perspective (pinhol...
Jingyi Yu, Yuanyuan Ding, and Leonard McMillan
ESORICS
2008
Springer
13 years 8 months ago
Cryptographic Protocol Explication and End-Point Projection
Abstract. Cryptographic protocols are useful for engineering trust in transactions. There are several languages for describing these protocols, but these tend to capture the commun...
Jay A. McCarthy, Shriram Krishnamurthi
POPL
2008
ACM
14 years 7 months ago
Relevance heuristics for program analysis
Relevance heuristics allow us to tailor a program analysis to a particular property to be verified. This in turn makes it possible to improve the precision of the analysis where n...
Kenneth L. McMillan
ATAL
2008
Springer
13 years 8 months ago
Modeling parallel and reactive empathy in virtual agents: an inductive approach
Humans continuously assess one another's situational context, modify their own affective state, and then respond based on these outcomes through empathetic expression. Virtua...
Scott W. McQuiggan, Jennifer L. Robison, Robert Ph...