Sciweavers

1234 search results - page 222 / 247
» Privacy-preserving Virtual Machine
Sort
View
ACNS
2009
Springer
157views Cryptology» more  ACNS 2009»
15 years 6 months ago
Malyzer: Defeating Anti-detection for Application-Level Malware Analysis
Abstract. Malware analysis is critical for malware detection and prevention. To defeat malware analysis and detection, today malware commonly adopts various sophisticated anti-dete...
Lei Liu, Songqing Chen
ECTEL
2009
Springer
15 years 6 months ago
How Much Assistance Is Helpful to Students in Discovery Learning?
How much help helps in discovery learning? This question is one instance of the assistance dilemma, an important issue in the learning sciences and educational technology research....
Alexander Borek, Bruce M. McLaren, Michael Karabin...
CGO
2007
IEEE
15 years 6 months ago
Run-Time Support for Optimizations Based on Escape Analysis
The JavaTM programming language does not allow the programmer to influence memory management. An object is usually allocated on the heap and deallocated by the garbage collector ...
Thomas Kotzmann, Hanspeter Mössenböck
AIHC
2007
Springer
15 years 5 months ago
Affect Detection and an Automated Improvisational AI Actor in E-Drama
Enabling machines to understand emotions and feelings of the human users in their natural language textual input during interaction is a challenging issue in Human Computing. Our w...
Li Zhang, Marco Gillies, John A. Barnden, Robert J...
GCC
2003
Springer
15 years 4 months ago
Component-Based Middleware Platform for Grid Computing
: In the Grid environment, user can manage and make use of web services, such as uploading or downloading web services. But when user want to download one web services to run it in...
Jianmin Zhu, Rong Chen, Guangnan Ni, Yuan Liu