Sciweavers

235 search results - page 32 / 47
» Spatiotemporal analysis in virtual environments using eigenb...
Sort
View
SP
2009
IEEE
262views Security Privacy» more  SP 2009»
15 years 6 months ago
Automatic Reverse Engineering of Malware Emulators
Malware authors have recently begun using emulation technology to obfuscate their code. They convert native malware binaries into bytecode programs written in a randomly generated...
Monirul I. Sharif, Andrea Lanzi, Jonathon T. Giffi...
CCS
2011
ACM
13 years 11 months ago
Eliminating the hypervisor attack surface for a more secure cloud
Cloud computing is quickly becoming the platform of choice for many web services. Virtualization is the key underlying technology enabling cloud providers to host services for a l...
Jakub Szefer, Eric Keller, Ruby B. Lee, Jennifer R...
IUI
2005
ACM
15 years 5 months ago
Interfaces for networked media exploration and collaborative annotation
In this paper, we present our efforts towards creating interfaces for networked media exploration and collaborative annotation. The problem is important since online social networ...
Preetha Appan, Bageshree Shevade, Hari Sundaram, D...
CHI
2001
ACM
16 years 1 days ago
The impact of eye gaze on communication using humanoid avatars
In this paper we describe an experiment designed to investigate the importance of eye gaze in humanoid avatars representing people engaged in conversation. We compare responses to...
Maia Garau, Mel Slater, Simon Bee, Martina Angela ...
CHI
2000
ACM
15 years 4 months ago
The social life of small graphical chat spaces
This paper provides a unique quantitative analysis of the social dynamics of three chat rooms in the Microsoft VChat graphical chat system. Survey and behavioral data were used to...
Marc A. Smith, Shelly Farnham, Steven M. Drucker