Sciweavers

3341 search results - page 269 / 669
» A Communication Virtual Machine
Sort
View
VEE
2012
ACM
238views Virtualization» more  VEE 2012»
13 years 12 months ago
Replacement attacks against VM-protected applications
Process-level virtualization is increasingly being used to enhance the security of software applications from reverse engineering and unauthorized modification (called software p...
Sudeep Ghosh, Jason Hiser, Jack W. Davidson
VRCAI
2009
ACM
15 years 11 months ago
Modelling socially intelligent virtual humans
In this paper, we mention about various techniques in order to create ”socially intelligent virtual humans” which can interact with people using natural ways of communication....
Nadia Magnenat-Thalmann
HICSS
2008
IEEE
94views Biometrics» more  HICSS 2008»
15 years 11 months ago
The Impact of Conflict and Conflict Management Style on Deadbeats and Deserters in Virtual Teams
Individuals face additional challenges when interacting in virtual teams. The lack of media richness and the asynchronous nature of technologically transmitted messages make commu...
Kimberly A. Furumo
GLOBECOM
2007
IEEE
15 years 10 months ago
Virtualization of Local Computer Bus Architectures Over the Internet
We propose a companion solution to iSCSI that is more suited for virtualization of local computer bus architectures, such as PCI/PCI-X and PCI Express. We explore the architecture ...
David A. Daniel, Joseph Y. Hui
IVA
2007
Springer
15 years 10 months ago
The Rickel Gaze Model: A Window on the Mind of a Virtual Human
Gaze plays a large number of cognitive, communicative and affective roles in face-to-face human interaction. To build a believable virtual human, it is imperative to construct a ga...
Jina Lee, Stacy Marsella, David R. Traum, Jonathan...