Sciweavers

377 search results - page 44 / 76
» Operating system virtualization: practice and experience
Sort
View
EDBTW
2010
Springer
14 years 4 months ago
Collaborative data privacy for the web
While data privacy is a human right, it is challenging to enforce it. For example, if multiple retailers execute a single order at Amazon Marketplace, each retailer can use diffe...
Clemens Heidinger, Erik Buchmann, Klemens Böh...
WORM
2003
13 years 11 months ago
Detection of injected, dynamically generated, and obfuscated malicious code
This paper presents DOME, a host-based technique for detecting several general classes of malicious code in software executables. DOME uses static analysis to identify the locatio...
Jesse C. Rabek, Roger I. Khazan, Scott M. Lewandow...
ICRA
1999
IEEE
114views Robotics» more  ICRA 1999»
14 years 2 months ago
A Human-Robot Interface Using an Extended Digital Desk
MuchattentionhasrecentlybeenpaidtoAugmented Reality (AR) systems, which can enhance a human's dailylife by blending multi-modalinformation with the real world. Most existing ...
Maho Terashima, Shigeyuki Sakane
ACSAC
2005
IEEE
14 years 3 months ago
Multi-Level Security Requirements for Hypervisors
Using hypervisors or virtual machine monitors for security has become very popular in recent years, and a number of proposals have been made for supporting multi-level security on...
Paul A. Karger
DAGM
2003
Springer
14 years 3 months ago
Color-Based Object Tracking in Multi-camera Environments
This paper presents a multi-view tracker, meant to operate in smart rooms that are equipped with multiple cameras. The cameras are assumed to be calibrated3 . In particular, we dem...
Katja Nummiaro, Esther Koller-Meier, Tomás ...