Sciweavers

811 search results - page 121 / 163
» Modeling and Virtualization for Secure Computing Environment...
Sort
View
150
Voted
CCS
2010
ACM
15 years 3 months ago
AccessMiner: using system-centric models for malware protection
Models based on system calls are a popular and common approach to characterize the run-time behavior of programs. For example, system calls are used by intrusion detection systems...
Andrea Lanzi, Davide Balzarotti, Christopher Krueg...
134
Voted
AGENTS
2001
Springer
15 years 7 months ago
Using rat navigation models to learn orientation from visual input on a mobile robot
Rodents possess extraordinary navigation abilities that are far in excess of what current state-of-the-art robot agents are capable of. This paper describes research that is part ...
Brett Browning
241
Voted
ATC
2010
Springer
15 years 1 months ago
Agent-Augmented Co-Space: Toward Merging of Real World and Cyberspace
Co-Space refers to interactive virtual environment modelled after the real world we are situated in. Through realistic 3D modelling and animation technologies, Co-Space simulates t...
Ah-Hwee Tan, Yilin Kang
125
Voted
UMUAI
2010
136views more  UMUAI 2010»
15 years 1 months ago
Towards affective camera control in games
Information about interactive virtual environments, such as games, is perceived by users through a virtual camera. While most interactive applications let users control the camera,...
Georgios N. Yannakakis, Héctor Perez Mart&i...
172
Voted
MOBIQUITOUS
2005
IEEE
15 years 8 months ago
MAIPAN - Middleware for Application Interconnection in Personal Area Networks
This paper proposes the Middleware for Application Interconnection in Personal Area Networks (MAIPAN), a middleware that provides a uniform computing environment for creating dyna...
Miklós Aurél Rónai, Kristof F...