Sciweavers

18204 search results - page 3487 / 3641
» Distributed Video Presentations
Sort
View
139
Voted
ATAL
2005
Springer
15 years 9 months ago
Designing multiparty interaction support in Elva, an embodied tour guide
Although social research into group interaction has flourished since the 20th century, the technology of embodied conversational agents for handling multiparty interaction is stil...
Jun Zheng, Xiang Yuan, Yam San Chee
127
Voted
CCS
2005
ACM
15 years 9 months ago
On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits
Vulnerabilities that allow worms to hijack the control flow of each host that they spread to are typically discovered months before the worm outbreak, but are also typically disc...
Jedidiah R. Crandall, Zhendong Su, Shyhtsun Felix ...
155
Voted
CCS
2005
ACM
15 years 9 months ago
Tracking anonymous peer-to-peer VoIP calls on the internet
Peer-to-peer VoIP calls are becoming increasingly popular due to their advantages in cost and convenience. When these calls are encrypted from end to end and anonymized by low lat...
Xinyuan Wang, Shiping Chen, Sushil Jajodia
161
Voted
CCS
2005
ACM
15 years 9 months ago
Automatic diagnosis and response to memory corruption vulnerabilities
Cyber attacks against networked computers have become relentless in recent years. The most common attack method is to exploit memory corruption vulnerabilities such as buffer ove...
Jun Xu, Peng Ning, Chongkyung Kil, Yan Zhai, Chris...
114
Voted
CEEMAS
2005
Springer
15 years 9 months ago
How Our Beliefs Contribute to Interpret Actions
Abstract. In update logic the interpretation of an action is often assumed to be independent from the agents’ beliefs about the situation (see [BMS04] or [Auc05]). In this paper ...
Guillaume Aucher
« Prev « First page 3487 / 3641 Last » Next »