Sciweavers

7576 search results - page 1365 / 1516
» UNIX as an Application Program
Sort
View
WORM
2003
15 years 6 months ago
Detection of injected, dynamically generated, and obfuscated malicious code
This paper presents DOME, a host-based technique for detecting several general classes of malicious code in software executables. DOME uses static analysis to identify the locatio...
Jesse C. Rabek, Roger I. Khazan, Scott M. Lewandow...
WSCG
2003
171views more  WSCG 2003»
15 years 6 months ago
A Task Definition Language for Virtual Agents
The use of Virtual Environments as a user interface can be important for certain types of applications, especially in the fields of education and entertainment. These synthetic wo...
Spyros Vosinakis, Themis Panayiotopoulos
GRAPHICSINTERFACE
2000
15 years 6 months ago
Analysis and Synthesis of Structural Textures
With the advent of image based modeling techniques, it becomes easier to apply textures extracted from reality onto virtual worlds. Many repetitive patterns (structural textures) ...
Laurent Lefebvre, Pierre Poulin
WSC
1998
15 years 6 months ago
Windows-based Animation with PROOF
Proof AnimationTM is a family of products for animating discrete event simulations. Proof is available in a variety of versions, including an inexpensive, student version, midsize...
James O. Henriksen
SMARTNET
2000
15 years 6 months ago
Software Agent Constrained Mobility for Network Performance Monitoring
During the recent years of research on mobile agents, significant effort has been directed towards the identification of models of agent mobility suitable for network management a...
Christos Bohoris, Antonio Liotta, George Pavlou
« Prev « First page 1365 / 1516 Last » Next »