: Intrusion detection systems continuously watch the activity of a network or computer, looking for attack or intrusion evidences. However, hostbased intrusion detectors are partic...
Cloud computing systems are becoming an important platform for science applications. Infrastructure as a Service (IaaS) clouds provide the capability to provision virtual machines...
Some of today’s most widely spread applications are social systems where people can form communities and share knowledge. However, knowledge sharing is not always effective and c...
This article investigates the growing complexity and connectivity between two former separated interaction spaces – the real and the virtual world. It is our attempt to augment ...
Abstract. We aim to create a model of emotional reactive virtual humans. This model will help to define realistic behavior for virtual characters based on emotions and events in t...