Sciweavers

811 search results - page 70 / 163
» Modeling and Virtualization for Secure Computing Environment...
Sort
View
CANDT
2009
14 years 21 days ago
And the ringleaders were banned: an examination of protest in virtual worlds
Protest has made the jump between the offline and the online spaces and is frequently used in most virtual worlds available today. Despite the frequency of these protest actions i...
Bridget Marie Blodgett
TRIDENTCOM
2008
IEEE
14 years 3 months ago
A 3GPP system architecture evolution virtualized experimentation infrastructure for mobility prototyping
The 3GPP System Architecture Evolution (SAE) is a very attractive environment from the service provisioning perspective, thanks to the variety of access technologies and mobility ...
Miguel Gómez Rodríguez, Fermí...
CN
2007
179views more  CN 2007»
13 years 8 months ago
Protecting host-based intrusion detectors through virtual machines
: Intrusion detection systems continuously watch the activity of a network or computer, looking for attack or intrusion evidences. However, hostbased intrusion detectors are partic...
Marcos Laureano, Carlos Maziero, Edgard Jamhour
ICCV
2007
IEEE
14 years 3 months ago
Real Time Body Pose Tracking in an Immersive Training Environment
Abstract. We describe a visual communication application for a dark, theaterlike interactive virtual simulation training environment. Our system visually estimates and tracks the b...
Chi-Wei Chu, Ramakant Nevatia
SIGECOM
2008
ACM
151views ECommerce» more  SIGECOM 2008»
13 years 8 months ago
Security and insurance management in networks with heterogeneous agents
Computer users express a strong desire to prevent attacks and to reduce the losses from computer and information security breaches. However, security compromises are common and wi...
Jens Grossklags, Nicolas Christin, John Chuang