Sciweavers

6249 search results - page 1200 / 1250
» Topological Informational Spaces
Sort
View
ASPLOS
2006
ACM
14 years 3 months ago
ExecRecorder: VM-based full-system replay for attack analysis and system recovery
Log-based recovery and replay systems are important for system reliability, debugging and postmortem analysis/recovery of malware attacks. These systems must incur low space and p...
Daniela A. S. de Oliveira, Jedidiah R. Crandall, G...
MSR
2006
ACM
14 years 3 months ago
Using software birthmarks to identify similar classes and major functionalities
Software birthmarks are unique and native characteristics of every software component. Two components having similar birthmarks indicate that they are similar in functionality, st...
Takeshi Kakimoto, Akito Monden, Yasutaka Kamei, Ha...
NETGAMES
2006
ACM
14 years 3 months ago
Authority assignment in distributed multi-player proxy-based games
We present a proxy-based gaming architecture and authority assignment within this architecture that can lead to better game playing experience in Massively Multi-player Online gam...
Sudhir Aggarwal, Justin Christofoli, Sarit Mukherj...
VRST
2006
ACM
14 years 3 months ago
Simple user-generated motion cueing can enhance self-motion perception (Vection) in virtual reality
Despite amazing advances in the visual quality of virtual environments, affordable-yet-effective self-motion simulation still poses a major challenge. Using a standard psychophysi...
Bernhard E. Riecke
ICSM
2005
IEEE
14 years 2 months ago
A Safe Regression Test Selection Technique for Database-Driven Applications
Regression testing is a widely-used method for checking whether modifications to software systems have adversely affected the overall functionality. This is potentially an expens...
David Willmor, Suzanne M. Embury
« Prev « First page 1200 / 1250 Last » Next »