Sciweavers

1005 search results - page 59 / 201
» Can machines call people
Sort
View
IASTEDSEA
2004
13 years 11 months ago
Java bytecode verification with dynamic structures
Java applets run on a Virtual Machine that checks code's integrity and correctness before execution using a module called Bytecode Verifier. Java Card technology allows Java ...
Cinzia Bernardeschi, Luca Martini, Paolo Masci
AI50
2006
14 years 1 months ago
The Physical Symbol System Hypothesis: Status and Prospects
I analyze some of the attacks against the Physical Symbol System Hypothesis--attacks based on the presumed need for symbolgrounding and non-symbolic processing for intelligent beha...
Nils J. Nilsson
INFOCOM
2009
IEEE
14 years 4 months ago
Detecting Spam Zombies by Monitoring Outgoing Messages
—Compromised machines are one of the key security threats on the Internet; they are often used to launch various security attacks such as DDoS, spamming, and identity theft. In t...
Zhenhai Duan, Peng Chen, Fernando Sanchez, Yingfei...
MICRO
2010
IEEE
142views Hardware» more  MICRO 2010»
13 years 8 months ago
Virtual Snooping: Filtering Snoops in Virtualized Multi-cores
Virtualization has been rapidly expanding its applications in numerous server and desktop environments to improve the utilization and manageability of physical systems. Such prolif...
Daehoon Kim, Hwanju Kim, Jaehyuk Huh
CRV
2005
IEEE
166views Robotics» more  CRV 2005»
14 years 3 months ago
Face as Mouse Through Visual Face Tracking
This paper introduces a novel camera mouse driven by 3D model based visual face tracking. While camera becomes standard configuration for personal computer(PC) and computer speed...
Jilin Tu, Thomas S. Huang, Hai Tao