Search Results for author: Michael Steiner

Found 6 papers, 4 papers with code

StopThePop: Sorted Gaussian Splatting for View-Consistent Real-time Rendering

no code implementations1 Feb 2024 Lukas Radl, Michael Steiner, Mathias Parger, Alexander Weinrauch, Bernhard Kerbl, Markus Steinberger

Consequently, rendering performance is nearly doubled, making our approach 1. 6x faster than the original Gaussian Splatting, with a 50% reduction in memory requirements.

Novel View Synthesis

LAENeRF: Local Appearance Editing for Neural Radiance Fields

no code implementations15 Dec 2023 Lukas Radl, Michael Steiner, Andreas Kurz, Markus Steinberger

We address these limitations with LAENeRF, a unified framework for photorealistic and non-photorealistic appearance editing of NeRFs.

Analyzing the Internals of Neural Radiance Fields

1 code implementation1 Jun 2023 Lukas Radl, Andreas Kurz, Michael Steiner, Markus Steinberger

Modern Neural Radiance Fields (NeRFs) learn a mapping from position to volumetric density leveraging proposal network samplers.

Formally Verified Hardware/Software Co-Design for Remote Attestation

1 code implementation1 Nov 2018 Ivan De Oliveira Nunes, Karim Eldefrawy, Norrathep Rattanavipanon, Michael Steiner, Gene Tsudik

In this work, we take the first step towards formal verification of Remote Attestation (RA) by designing and verifying an architecture called VRASED: Verifiable Remote Attestation for Simple Embedded Devices.

Cryptography and Security

S-FaaS: Trustworthy and Accountable Function-as-a-Service using Intel SGX

1 code implementation14 Oct 2018 Fritz Alder, N. Asokan, Arseny Kurnikov, Andrew Paverd, Michael Steiner

A core contribution of S-FaaS is our set of resource measurement mechanisms that securely measure compute time inside an enclave, and actual memory allocations.

Cryptography and Security

Private Data Objects: an Overview

1 code implementation16 Jul 2018 Mic Bowman, Andrea Miele, Michael Steiner, Bruno Vavala

We present Private Data Objects (PDOs), a technology that enables mutually untrusted parties to run smart contracts over private data.

Cryptography and Security

Cannot find the paper you are looking for? You can Submit a new open access paper.