Sciweavers

886 search results - page 94 / 178
» Application of automated environment generation to commercia...
Sort
View
PST
2004
13 years 9 months ago
Detection of New Malicious Code Using N-grams Signatures
Signature-based malicious code detection is the standard technique in all commercial anti-virus software. This method can detect a virus only after the virus has appeared and cause...
Tony Abou-Assaleh, Nick Cercone, Vlado Keselj, Ray...
AVBPA
1997
Springer
140views Biometrics» more  AVBPA 1997»
14 years 1 days ago
Integrating Face Recognition into Security Systems
Automated processing of facial images has become a serious market for both hard- and software products. For the commercial success of face recognition systems it is most crucial th...
Volker Vetter, Thomas Zielke, Werner von Seelen
COOPIS
2002
IEEE
14 years 25 days ago
An Infrastructure for Adaptable Middleware
Abstract. Today’s software systems have to deal with an increasing diversity and complexity of execution environments. Next generation applications will have to deal with the unk...
Pierre-Charles David, Thomas Ledoux
EUROPAR
2009
Springer
14 years 2 months ago
POGGI: Puzzle-Based Online Games on Grid Infrastructures
Massively Multiplayer Online Games (MMOGs) currently entertain millions of players daily. To keep these players online and generate revenue, MMOGs are currently relying on manually...
Alexandru Iosup
ICRA
1999
IEEE
117views Robotics» more  ICRA 1999»
14 years 5 days ago
Collision Control in Teleoperation by Virtual Force Reflection: An Application to the ROBTET System
: Well known collision avoiding approaches used in automatic robot path planning are also applied in teleoperation systems when moving in hazardous environments. In such cases, it ...
Miguel Hernando, Ernesto Gambao, E. Pinto, Antonio...