This paper presents ongoing research on human-computer interaction in virtual environments using voice recognition systems. The paper starts describing voice recognition technologi...
Rootkits are used by malicious attackers who desire to run software on a compromised machine without being detected. They have become stealthier over the years as a consequence of...
Francis M. David, Ellick Chan, Jeffrey C. Carlyle,...
Multiagent systems (MAS) research is well established yet there is little development of agent technology in industry. It has been suggested that this is due, in part, to the unav...
Abstract--Modeling environments and performance prediction boost application productivity, but often lack integration into an efficient and comprehensive approach to strategic desi...
The importance of early performance assessment grows as software systems increase in terms of size, logical distribution and interaction complexity. Lack of time from the side of ...