Sciweavers

283 search results - page 50 / 57
» Testing CPU emulators
Sort
View
ACMACE
2006
ACM
15 years 5 months ago
Sketching-out virtual humans: from 2D storyboarding to immediate 3D character animation
Virtual beings are playing a remarkable role in today’s public entertainment, while ordinary users are still treated as audiences due to the lack of appropriate expertise, equip...
Chen Mao, Sheng Feng Qin, David K. Wright
ACMICEC
2004
ACM
162views ECommerce» more  ACMICEC 2004»
15 years 5 months ago
Balanced matching of buyers and sellers in e-marketplaces: the barter trade exchange model
In this paper, we describe the operation of barter trade exchanges by identifying key techniques used by trade brokers to stimulate trade and satisfy member needs, and present alg...
Peter Haddawy, Namthip Rujikeadkumjorn, Khaimook D...
CCS
2007
ACM
15 years 3 months ago
Analyzing network traffic to detect self-decrypting exploit code
Remotely-launched software exploits are a common way for attackers to intrude into vulnerable computer systems. As detection techniques improve, remote exploitation techniques are...
Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Pu...
AAAI
1998
15 years 1 months ago
Automated Intelligent Pilots for Combat Flight Simulation
TacAir-Soar is an intelligent, rule-based system that generates believable human-like" behavior for military simulations. The innovation of the application is primarily a mat...
Randolph M. Jones, John E. Laird, Paul E. Nielsen
CMS
2010
150views Communications» more  CMS 2010»
15 years 2 days ago
Throwing a MonkeyWrench into Web Attackers Plans
Abstract. Client-based attacks on internet users with malicious web pages represent a serious and rising threat. Internet Browsers with enabled active content technologies such as ...
Armin Büscher, Michael Meier, Ralf Benzmü...