Sciweavers

923 search results - page 136 / 185
» Improved Slide Attacks
Sort
View
FDG
2009
ACM
15 years 3 months ago
Influence points for tactical information in navigation meshes
Good artificial intelligence for strategy and first person shooter games requires tactical information. Tactical information assists agents in choosing appropriate places to place...
Frederick W. P. Heckel, G. Michael Youngblood, D. ...
DATE
2004
IEEE
139views Hardware» more  DATE 2004»
15 years 3 months ago
Flexible Software Protection Using Hardware/Software Codesign Techniques
A strong level of trust in the software running on an embedded processor is a prerequisite for its widespread deployment in any high-risk system. The expanding field of software p...
Joseph Zambreno, Alok N. Choudhary, Rahul Simha, B...
EUROMICRO
2004
IEEE
15 years 3 months ago
Intrusion Detection in Virtual Machine Environments
A virtual machine is a software replica of an underlying real machine. Multiple virtual machines can operate on the same host machine concurrently, without interfere each other. S...
Marcos Laureano, Carlos Maziero, Edgard Jamhour
CRITIS
2006
15 years 3 months ago
Applying Key Infrastructures for Sensor Networks in CIP/CIIP Scenarios
It is commonly agreed that Wireless Sensor Networks (WSN) is one of the technologies that better fulfills features like the ones required by Critical (Information) Infrastructures....
Cristina Alcaraz, Rodrigo Roman
FTDCS
2004
IEEE
15 years 3 months ago
Exploiting Semantic Proximity in Peer-to-Peer Content Searching
A lot of recent work has dealt with improving performance of content searching in peer-to-peer file sharing systems. In this paper we attack this problem by modifying the overlay ...
Spyros Voulgaris, Anne-Marie Kermarrec, Laurent Ma...