Sciweavers

2549 search results - page 389 / 510
» Interactive virtual angioscopy
Sort
View
ACSAC
1999
IEEE
15 years 8 months ago
Safe Areas of Computation for Secure Computing with Insecure Applications
Currently the computer systems and software used by the average user offer virtually no security. Because of this many attacks, both simulated and real, have been described by the...
André L. M. dos Santos, Richard A. Kemmerer
DSRT
1999
IEEE
15 years 8 months ago
Simulation of Multimedia Systems Based on Actors and QoSsynchronizers
This paper describes a variant of the actor model suited to the development of multimedia systems. The actor model centers on non-overkilling concurrency and customizable constrai...
Giancarlo Fortino, Libero Nigro
VRML
1999
ACM
15 years 8 months ago
Avatars in LivingSpace
We describe how we implemented the avatars we use to represent users in LivingSpace, our implementation of the Living Worlds standard for multi-user distributed VRML worlds. Livin...
Mike Wray, Vincent Belrose
ISF
2002
107views more  ISF 2002»
15 years 3 months ago
A Negotiation Enabling Agent Based Infrastructure: Composition and Behavior
Software agent-based negotiation is a major method to automate the interactions in electronic marketplaces and Internet enabled communities. The traditional approach is to let the...
Nicolae B. Szirbik
SAC
2008
ACM
15 years 3 months ago
Web service access management for integration with agent systems
The agent paradigm includes the notion that agents interact with services. This paper identifies the need for controlled access to such services, from the perspective of agent sys...
Benno J. Overeinder, P. D. Verkaik, Frances M. T. ...