Sciweavers

811 search results - page 72 / 163
» Modeling and Virtualization for Secure Computing Environment...
Sort
View
CSFW
2006
IEEE
14 years 2 months ago
Simulation-Based Security with Inexhaustible Interactive Turing Machines
Recently, there has been much interest in extending models for simulation-based security in such a way that the runtime of protocols may depend on the length of their input. Findi...
Ralf Küsters
CGI
1998
IEEE
14 years 1 months ago
Virtual 3D Sculpturing with a Parametric Hand Surface
Many techniques have been developed for 3D object deformation. These techniques have been widely used in most CAD/CAM systems. Intuitive while efficient methods for interactive 3D...
Janis P. Y. Wong, Rynson W. H. Lau, Lizhuang Ma
PG
1997
IEEE
14 years 1 months ago
Real-time virtual humans
The last few years have seen great maturationin the computation speed and control methods needed to portray 3D virtualhumanssuitableforreal interactiveapplications. We first desc...
Norman I. Badler
DRM
2006
Springer
14 years 14 days ago
Proteus: virtualization for diversified tamper-resistance
Despite huge efforts by software providers, software protection mechanisms are still broken on a regular basis. Due to the current distribution model, an attack against one copy o...
Bertrand Anckaert, Mariusz H. Jakubowski, Ramarath...
DSN
2011
IEEE
12 years 8 months ago
Applying game theory to analyze attacks and defenses in virtual coordinate systems
—Virtual coordinate systems provide an accurate and efficient service that allows hosts on the Internet to determine latency to arbitrary hosts based on information provided by ...
Sheila Becker, Jeff Seibert, David Zage, Cristina ...