Sciweavers

9245 search results - page 1591 / 1849
» Virtualization
Sort
View
WOA
2003
15 years 5 months ago
An approach to the integration of peer-to-peer systems with active environments
— We adopt a form of group communication, called channeled multicast, for active rooms and other scenarios featuring strict real-time requirements, inherently unreliable communic...
Paolo Busetta, Mattia Merzi
WORM
2003
15 years 5 months ago
Detection of injected, dynamically generated, and obfuscated malicious code
This paper presents DOME, a host-based technique for detecting several general classes of malicious code in software executables. DOME uses static analysis to identify the locatio...
Jesse C. Rabek, Roger I. Khazan, Scott M. Lewandow...
ECIS
2000
15 years 5 months ago
Open Source Movements as a Model for Organizing
Open source software such as the operating system Linux has in a few years created much attention as an alternative way to develop and distribute software. Open source is to let an...
Jan Ljungberg
164
Voted
WSCG
2003
151views more  WSCG 2003»
15 years 5 months ago
Large Model Visualization: Techniques and Applications
The visual representation of complex data has always been a major motivation for computer graphics. However, there have always been computer graphics scenes which were too complex...
Dirk Bartz
WSCG
2003
150views more  WSCG 2003»
15 years 5 months ago
Smart Objects for Attentive Agents
We present an extended framework for modelling agent-object interactions in virtual environments. Our framework is based on the concept of Smart Objects and provides agents with p...
Christopher Peters, Simon Dobbyn, Brian MacNamee, ...
« Prev « First page 1591 / 1849 Last » Next »