Sciweavers

1822 search results - page 335 / 365
» GENI Design Principles
Sort
View
140
Voted
IJDE
2006
95views more  IJDE 2006»
15 years 3 months ago
Exploiting the Rootkit Paradox with Windows Memory Analysis
Rootkits are malicious programs that silently subvert an operating system to hide an intruder's activities. Although there are a number of tools designed to detect rootkits, ...
Jesse D. Kornblum
JTAER
2008
175views more  JTAER 2008»
15 years 3 months ago
A Core Component-based Modelling Approach for Achieving e-Business Semantics Interoperability
The adoption of advanced integration technologies that enable private and public organizations to seamlessly execute their business transactions electronically is still relatively...
Till Janner, Fenareti Lampathaki, Volker Hoyer, Sp...
138
Voted
TISSEC
2008
235views more  TISSEC 2008»
15 years 3 months ago
SDAP: A Secure Hop-by-Hop Data Aggregation Protocol for Sensor Networks
Hop-by-hop data aggregation is a very important technique for reducing the communication overhead and energy expenditure of sensor nodes during the process of data collection in a...
Yi Yang, Xinran Wang, Sencun Zhu, Guohong Cao
VR
2008
IEEE
202views Virtual Reality» more  VR 2008»
15 years 3 months ago
FARMTASIA: an online game-based learning environment based on the VISOLE pedagogy
Virtual interactive student-oriented learning environment (VISOLE) is a game-based constructivist pedagogical approach that encompasses the creation of an online interactive world ...
Kevin K. F. Cheung, Morris Siu Yung Jong, Fong Lok...
143
Voted
AAI
1998
99views more  AAI 1998»
15 years 3 months ago
Toward Socially Intelligent Service Robots
In the Intelligent Robotics Laboratory (IRL) at Vanderbilt University we seek to develop service robots with a high level of social intelligence and interactivity. In order to ach...
Mitchell Wilkes, W. Anthony Alford, Robert T. Pack...