Sciweavers

3686 search results - page 89 / 738
» An Approach to a Trustworthy System Architecture Using Virtu...
Sort
View
WSCG
2001
108views more  WSCG 2001»
13 years 10 months ago
Co-Operative and Concurrent Blending Motion Generators
In this paper we will be describing a new animation architecture and its implementation in our system LIVE. This model introduces a new blending layer approach which uses several ...
Vincent Bonnafous, Eric Menou, Jean-Pierre Jessel,...
ICRA
1999
IEEE
117views Robotics» more  ICRA 1999»
14 years 1 months ago
Collision Control in Teleoperation by Virtual Force Reflection: An Application to the ROBTET System
: Well known collision avoiding approaches used in automatic robot path planning are also applied in teleoperation systems when moving in hazardous environments. In such cases, it ...
Miguel Hernando, Ernesto Gambao, E. Pinto, Antonio...
AGS
2009
Springer
14 years 3 months ago
Distributed Platform for Large-Scale Agent-Based Simulations
Abstract. We describe a distributed architecture for situated largescale agent-based simulations with predominately local interactions. The approach, implemented in AglobeX Simulat...
David Sislák, Premysl Volf, Michal Jakob, M...
HICSS
2005
IEEE
176views Biometrics» more  HICSS 2005»
14 years 2 months ago
Architecture for Customer Relationship Management Approaches in Financial Services
The majority of financial services companies in Germany and Switzerland have, with varying objectives and success, conducted customer relationship management (CRM) implementation ...
Malte Geib, Annette Reichold, Lutz Kolbe, Walter B...
CCS
2009
ACM
14 years 3 months ago
Secure in-VM monitoring using hardware virtualization
Kernel-level attacks or rootkits can compromise the security of an operating system by executing with the privilege of the kernel. Current approaches use virtualization to gain hi...
Monirul I. Sharif, Wenke Lee, Weidong Cui, Andrea ...