Sciweavers

1565 search results - page 272 / 313
» The Intensional View Environment
Sort
View
SP
2007
IEEE
135views Security Privacy» more  SP 2007»
15 years 6 months ago
Exploring Multiple Execution Paths for Malware Analysis
Malicious code (or malware) is defined as software that fulfills the deliberately harmful intent of an attacker. Malware analysis is the process of determining the behavior and ...
Andreas Moser, Christopher Krügel, Engin Kird...
VR
2007
IEEE
153views Virtual Reality» more  VR 2007»
15 years 6 months ago
Interscopic User Interface Concepts for Fish Tank Virtual Reality Systems
In this paper we introduce new user interface concepts for fish tank virtual reality (VR) systems based on autostereoscopic (AS) display technologies. Such AS displays allow to v...
Frank Steinicke, Timo Ropinski, Gerd Bruder, Klaus...
ATAL
2007
Springer
15 years 6 months ago
Distributed management of flexible times schedules
In this paper we consider the problem of managing and exploiting schedules in an uncertain and distributed environment. We assume a team of collaborative agents, each responsible ...
Stephen F. Smith, Anthony Gallagher, Terry L. Zimm...
UIST
2005
ACM
15 years 5 months ago
Automation and customization of rendered web pages
On the desktop, an application can expect to control its user interface down to the last pixel, but on the World Wide Web, a content provider has no control over how the client wi...
Michael Bolin, Matthew Webber, Philip Rha, Tom Wil...
PADS
2004
ACM
15 years 5 months ago
Simulation Validation Using Direct Execution of Wireless Ad-Hoc Routing Protocols
Computer simulation is the most common approach to studying wireless ad-hoc routing algorithms. The results, however, are only as good as the models the simulation uses. One shoul...
Jason Liu, Yougu Yuan, David M. Nicol, Robert S. G...