搜索结果: 1-15 共查到“知识库 操作系统与操作环境”相关记录319条 . 查询时间(4.453 秒)
Video-Based Document Tracking: Unifying Your Physical and Electronic Desktops
Your Physical Electronic Desktops
2016/5/24
This paper presents an approach for tracking paper documents
on the desk over time and automatically linking them
to the corresponding electronic documents using an overhead
video camera. We demons...
Digital photography has made it possible to quickly and easily
take a pair of images of low-light environments: one with flash to
capture detail and one without flash to capture ambient illumination...
Physically-Based Manipulation on the Responsive Workbench
Responsive Workbench Physically-Based Manipulation
2016/5/24
This paper describes how a physical simulation can be
integrated with our Responsive Workbench system to support
complex assembly tasks involving multiple hands and
users. Our system uses the CORIO...
The Two-User Responsive Workbench: Support for Collaboration Through Individual Views of a Shared Space
Virtual environments Responsive Workbench
2016/5/24
We present the two-user Responsive Workbench: a projectionbased
virtual reality system that allows two people to simultaneously
view individual stereoscopic image pairs from their own
viewpoints. T...
Proton++: A Customizable Declarative Multitouch Framework
Proton++ custom attributes touch events symbols regular expressions gesture tablature
2016/5/24
Proton++ is a declarative multitouch framework that allows
developers to describe multitouch gestures as regular expressions
of touch event symbols. It builds on the Proton framework
by allowing de...
A Development Environment for Horizontal Microcode
Index Terms{mi ro ode ompa tion Per olation S heduling environment
2016/5/24
A Development Environment for Horizontal Microcode.
能耗是制约便携式智能设备发展的重要瓶颈.随着嵌入式操作系统的广泛应用,因不能合理使用操作系统的API而导致的能耗错误已经成为各种嵌入式应用开发过程中不容忽视的因素.为减少应用中的能耗错误,以符号执行技术为基础,根据禁止休眠类能耗错误的特点,设计了对应的能耗错误检测方法.该方法首先利用过程内分析,获得单个函数的符号执行信息.然后借助过程间分析对单个函数的符号执行信息进行全局综合,得到更为精确的执行开...
CMC:A Pragmatic Approach to Model Checking Real Code
CMC Pragmatic Approach Model Checking Real Code
2015/8/7
Many system errors do not emerge unless some intricate sequence of events occurs. In practice, this means that most systems have errors that only trigger after days or weeks of execution. Model checki...
Using Model Checking to Find Serious File System Errors
Model Checking Serious File System Errors
2015/8/7
This paper shows how to use model checking to find serious errors in file systems. Model checking is a formal verification technique tuned for finding corner-case errors by comprehensively exploring t...
Automatically Generating Malicious Disks using Symbolic Execution
Automatically Generating Malicious Disks Symbolic Execution
2015/8/7
Many current systems allow data produced by potentially malicious sources to be mounted as a file system. File system code must check this data for dangerous values or invariant violations before usin...
Bugs as Deviant Behavior:A General Approach to Inferring Errors in Systems Code
Bugs as Deviant Behavior Inferring Errors Systems Code
2015/8/7
A major obstacle to finding program errors in a real system is knowing what correctness rules the system must obey. These rules are often undocumented or specified in an ad hoc manner. This paper demo...
The ITTC project provides tools and an infrastructure for building intrusion tolerant applications. Rather than prevent intrusions or detect them after the fact, the ITTC system ensures that the compr...
Exchange of digitally signed certificates is often used to establish mutual trust between strangers that wish to share resources or to conduct business transactions. Automated Trust Negotiation (ATN) ...
We propose a fully functional identity-based encryption scheme (IBE). The scheme has chosen ciphertext security in the random oracle model assuming an elliptic curve variant of the computational Diffi...