Sciweavers

5277 search results - page 226 / 1056
» Virtual Audio Systems
Sort
View
ISW
2007
Springer
15 years 11 months ago
Detecting System Emulators
Malware analysis is the process of determining the behavior and purpose of a given malware sample (such as a virus, worm, or Trojan horse). This process is a necessary step to be a...
Thomas Raffetseder, Christopher Krügel, Engin...
BROADNETS
2006
IEEE
15 years 11 months ago
Intra and Interdomain Circuit Provisioning Using the OSCARS Reservation System
— With the advent of service sensitive applications such as remote controlled experiments, time constrained massive data transfers, and video-conferencing, it has become apparent...
Chin Guok, David W. Robertson, Mary R. Thompson, J...
HICSS
2010
IEEE
187views Biometrics» more  HICSS 2010»
16 years 8 days ago
Virtual Micro-Politics: Informal Tactics of Influence and Power in Inter-Organizational Networks
Although virtual organizations and networks have been studied for quite some time, there is still need for research regarding their inner dynamics and the mechanisms of leadership...
Monique Janneck, Henning Staar
VAST
2004
ACM
15 years 10 months ago
The Museum of Pure Form: touching real statues in an immersive virtual museum
In the Museum of Pure Form, we explore a novel way of presenting art to visitors of a museum, allowing them to virtually touch artefacts in a virtual museum. In order to realise t...
Céline Loscos, Franco Tecchia, Antonio Fris...
HICSS
2010
IEEE
216views Biometrics» more  HICSS 2010»
15 years 10 months ago
A Virtualization Architecture for In-Depth Kernel Isolation
Recent advances in virtualization technologies have sparked a renewed interest in the use of kernel and process virtualization as a security mechanism to enforce resource isolatio...
Jiang Wang, Sameer Niphadkar, Angelos Stavrou, Anu...