Sciweavers

1247 search results - page 225 / 250
» A Multi-User Virtual Machine
Sort
View
ICFP
2005
ACM
14 years 8 months ago
Continuations from generalized stack inspection
Implementing first-class continuations can pose a challenge if the target machine makes no provisions for accessing and re-installing the run-time stack. In this paper, we present...
Greg Pettyjohn, John Clements, Joe Marshall, Shrir...
ACNS
2009
Springer
157views Cryptology» more  ACNS 2009»
14 years 3 months ago
Malyzer: Defeating Anti-detection for Application-Level Malware Analysis
Abstract. Malware analysis is critical for malware detection and prevention. To defeat malware analysis and detection, today malware commonly adopts various sophisticated anti-dete...
Lei Liu, Songqing Chen
ECTEL
2009
Springer
14 years 3 months ago
How Much Assistance Is Helpful to Students in Discovery Learning?
How much help helps in discovery learning? This question is one instance of the assistance dilemma, an important issue in the learning sciences and educational technology research....
Alexander Borek, Bruce M. McLaren, Michael Karabin...
CGO
2007
IEEE
14 years 3 months ago
Run-Time Support for Optimizations Based on Escape Analysis
The JavaTM programming language does not allow the programmer to influence memory management. An object is usually allocated on the heap and deallocated by the garbage collector ...
Thomas Kotzmann, Hanspeter Mössenböck
AIHC
2007
Springer
14 years 2 months ago
Affect Detection and an Automated Improvisational AI Actor in E-Drama
Enabling machines to understand emotions and feelings of the human users in their natural language textual input during interaction is a challenging issue in Human Computing. Our w...
Li Zhang, Marco Gillies, John A. Barnden, Robert J...