Sciweavers

1234 search results - page 96 / 247
» Privacy-preserving Virtual Machine
Sort
View
IJVR
2007
123views more  IJVR 2007»
15 years 3 months ago
Towards Sociable Virtual Humans: Multimodal Recognition of Human Input and Behavior
—One of the biggest obstacles for constructing effective sociable virtual humans lies in the failure of machines to recognize the desires, feelings and intentions of the human us...
Christian Eckes, Konstantin Biatov, Frank Hül...
ACSAC
2009
IEEE
15 years 10 months ago
MAVMM: Lightweight and Purpose Built VMM for Malware Analysis
—Malicious software is rampant on the Internet and costs billions of dollars each year. Safe and thorough analysis of malware is key to protecting vulnerable systems and cleaning...
Anh M. Nguyen, Nabil Schear, HeeDong Jung, Apeksha...
CCGRID
2008
IEEE
15 years 10 months ago
Xen-Based HPC: A Parallel I/O Perspective
Virtualization using Xen-based virtual machine environment has yet to permeate the field of high performance computing (HPC). One major requirement for HPC is the availability of ...
Weikuan Yu, Jeffrey S. Vetter
104
Voted
LISA
2007
15 years 6 months ago
OS Circular: Internet Client for Reference
OS Circular is a framework for Internet Disk Image Distribution of software for virtual machines, those which offer a ‘‘virtualized’’ common PC environment on any PC. OS i...
Kuniyasu Suzaki, Toshiki Yagi, Kengo Iijima, Anh-Q...
DI
2007
81views more  DI 2007»
15 years 3 months ago
Using every part of the buffalo in Windows memory analysis
All Windows memory analysis techniques depend on the examiner’s ability to translate the virtual addresses used by programs and operating system components into the true locatio...
Jesse D. Kornblum