Sciweavers

566 search results - page 100 / 114
» A virtual class calculus
Sort
View
84
Voted
WORM
2003
14 years 11 months ago
Detection of injected, dynamically generated, and obfuscated malicious code
This paper presents DOME, a host-based technique for detecting several general classes of malicious code in software executables. DOME uses static analysis to identify the locatio...
Jesse C. Rabek, Roger I. Khazan, Scott M. Lewandow...
GRAPHICSINTERFACE
2000
14 years 11 months ago
Analysis and Synthesis of Structural Textures
With the advent of image based modeling techniques, it becomes easier to apply textures extracted from reality onto virtual worlds. Many repetitive patterns (structural textures) ...
Laurent Lefebvre, Pierre Poulin
IJCAI
1997
14 years 11 months ago
Recursive Plans for Information Gathering
Generating query-answering plans for information gathering agents requires to translate a user query, formulated in terms of a set of virtual relations, to a query that uses relat...
Oliver M. Duschka, Alon Y. Levy
OSDI
1996
ACM
14 years 11 months ago
Dealing with Disaster: Surviving Misbehaved Kernel Extensions
Today's extensible operating systems allow applications to modify kernel behavior by providing mechanisms for application code to run in the kernel address space. The advanta...
Margo I. Seltzer, Yasuhiro Endo, Christopher Small...
86
Voted
EUROGRAPHICS
2010
Eurographics
14 years 10 months ago
Fast and Efficient Skinning of Animated Meshes
Skinning is a simple yet popular deformation technique combining compact storage with efficient hardware accelerated rendering. While skinned meshes (such as virtual characters) a...
Ladislav Kavan, Peter-Pike Sloan, Carol O'Sullivan