Sciweavers

3002 search results - page 85 / 601
» Toward Virtual Humans
Sort
View
147
Voted
SISW
2005
IEEE
15 years 9 months ago
Towards Protecting Sensitive Files in a Compromised System
Protecting sensitive files from a compromised system helps administrator to thwart many attacks, discover intrusion trails, and fast restore the system to a safe state. However, ...
Xin Zhao, Kevin Borders, Atul Prakash
ISQED
2007
IEEE
109views Hardware» more  ISQED 2007»
15 years 10 months ago
Virtual Channels Planning for Networks-on-Chip
The virtual channel flow control (VCFC) provides an efficient implementation for on-chip networks. However, allocating the virtual channels (VCs) uniformly results in a waste of a...
Ting-Chun Huang, Ümit Y. Ogras, Radu Marcules...
109
Voted
ICPADS
2008
IEEE
15 years 10 months ago
Plug: Virtual Worlds for Millions of People
We propose the design of Plug, an application to find and keep contacts with friends within many inter-connected 3D virtual worlds. Users use an instant messenger (IM)-like inter...
Shun-Yun Hu, Jehn-Ruey Jiang
114
Voted
ICDIM
2007
IEEE
15 years 7 months ago
Incentives for resource sharing in self-organized communities: From economics to social psychology
In this position paper we analyze the benefits of enabling virtual communities to self-organize and introduce a novel research direction for providing incentives, required in this...
Panayotis Antoniadis, Bénédicte Le G...
140
Voted
ICIP
2002
IEEE
15 years 8 months ago
Panoramic capturing and recognition of human activity
This paper presents a unified approach to human activity capturing and recognition. It targets applications such as a speaker walking, turning around, sitting and getting up from ...
Xinding Sun, B. S. Manjunath