Sciweavers

811 search results - page 57 / 163
» Modeling and Virtualization for Secure Computing Environment...
Sort
View
CA
2003
IEEE
14 years 2 months ago
Bottom-Up Visual Attention for Virtual Human Animation
We present a system for the automatic generation of bottom-up visual attention behaviours in virtual humans. Bottom-up attention refers to the way in which the environment solicit...
Christopher Peters, Carol O'Sullivan
SAC
2000
ACM
14 years 1 months ago
Parallel C++ for the Java Virtual Machine
Object-oriented modeling and design is a way of solving problems using models based upon real-world concepts. In this paradigm, the fundamental construct is the object, an entity ...
Timothy E. Denehy, Chang-Hyun Jo
WISA
2007
Springer
14 years 2 months ago
A Compositional Multiple Policies Operating System Security Model
Multilevel security policies aim at only confidentiality assurance, with less consideration on integrity assurance and weakness in expressing channel control policies. Besides, the...
Lei Xia, Wei Huang, Hao Huang
NSPW
2004
ACM
14 years 2 months ago
A collaborative approach to autonomic security protocols
This paper considers a new security protocol paradigm whereby principals negotiate and on-the-fly generate security protocols according to their needs. When principals wish to in...
Hongbin Zhou, Simon N. Foley
GI
2009
Springer
13 years 6 months ago
Frontloading: Virtual Quality Assurance for Improved Service Launch Processes
: Swift and frictionless launches of new products are a decisive capability of future telecommunication providers, especially in an all-IP production environment. These processes a...
Heiko Lehmann, Uwe Beyer, Simon Cohnitz, Udo Bub