Sciweavers

1755 search results - page 117 / 351
» Design and Implementation of Virtual Organizations
Sort
View
133
Voted
ICMI
2009
Springer
94views Biometrics» more  ICMI 2009»
15 years 10 months ago
Modeling culturally authentic style shifting with virtual peers
: We report on a new kind of culturally-authentic embodied conversational agent more in line with the ways that culture and ethnicity function in the real world. On the basis of th...
Justine Cassell, Kathleen Geraghty, Berto Gonzalez...
SP
2008
IEEE
134views Security Privacy» more  SP 2008»
15 years 10 months ago
Lares: An Architecture for Secure Active Monitoring Using Virtualization
Host-based security tools such as anti-virus and intrusion detection systems are not adequately protected on today’s computers. Malware is often designed to immediately disable ...
Bryan D. Payne, Martim Carbone, Monirul I. Sharif,...
ACMACE
2008
ACM
15 years 5 months ago
MPML3D: agent authoring language for virtual worlds
This paper describes an authoring language for specifying communicative behavior and interaction of agents in virtual worlds. We focus on the popular three-dimensional (3D) multi-...
Sebastian Ullrich, Helmut Prendinger, Mitsuru Ishi...
233
Voted
FAST
2011
14 years 7 months ago
Capo: Recapitulating Storage for Virtual Desktops
Shared storage underlies most enterprise VM deployments because it is an established technology that administrators are familiar with and because it good job of protecting data. H...
Mohammad Shamma, Dutch T. Meyer, Jake Wires, Maria...
167
Voted
OSDI
2008
ACM
16 years 4 months ago
Towards Virtual Passthrough I/O on Commodity Devices
A commodity I/O device has no support for virtualization. A VMM can assign such a device to a single guest with direct, fast, but insecure access by the guest's native device...
Lei Xia, Jack Lange, Peter A. Dinda