Sciweavers

811 search results - page 121 / 163
» Modeling and Virtualization for Secure Computing Environment...
Sort
View
CCS
2010
ACM
13 years 9 months ago
AccessMiner: using system-centric models for malware protection
Models based on system calls are a popular and common approach to characterize the run-time behavior of programs. For example, system calls are used by intrusion detection systems...
Andrea Lanzi, Davide Balzarotti, Christopher Krueg...
AGENTS
2001
Springer
14 years 1 months ago
Using rat navigation models to learn orientation from visual input on a mobile robot
Rodents possess extraordinary navigation abilities that are far in excess of what current state-of-the-art robot agents are capable of. This paper describes research that is part ...
Brett Browning
ATC
2010
Springer
13 years 7 months ago
Agent-Augmented Co-Space: Toward Merging of Real World and Cyberspace
Co-Space refers to interactive virtual environment modelled after the real world we are situated in. Through realistic 3D modelling and animation technologies, Co-Space simulates t...
Ah-Hwee Tan, Yilin Kang
UMUAI
2010
136views more  UMUAI 2010»
13 years 7 months ago
Towards affective camera control in games
Information about interactive virtual environments, such as games, is perceived by users through a virtual camera. While most interactive applications let users control the camera,...
Georgios N. Yannakakis, Héctor Perez Mart&i...
MOBIQUITOUS
2005
IEEE
14 years 2 months ago
MAIPAN - Middleware for Application Interconnection in Personal Area Networks
This paper proposes the Middleware for Application Interconnection in Personal Area Networks (MAIPAN), a middleware that provides a uniform computing environment for creating dyna...
Miklós Aurél Rónai, Kristof F...