Results 31 to 40 of about 17,865 (172)

HyBIS: Windows Guest Protection through Advanced Memory Introspection

open access: yes, 2016
Effectively protecting the Windows OS is a challenging task, since most implementation details are not publicly known. Windows has always been the main target of malwares that have exploited numerous bugs and vulnerabilities.
C Mahapatra   +8 more
core   +3 more sources

Trusted auditing method of virtual machine based on improved expectation decision method

open access: yesTongxin xuebao, 2018
Whether the cloud computing environment is credible is the key factor in the promotion and effective use of cloud computing.For this reason,the expected value decision method in risk decision-making was improved.The usage scenarios was redefined,the cost
Junfeng TIAN, Yongchao ZHANG
doaj   +2 more sources

What am I? Virtual Machines and the Mind/Body Problem [PDF]

open access: yes, 2007
When your word processor or email program is running on your computer, this creates a "virtual machine” that manipulates windows, files, text, etc. What is this virtual machine, and what are the virtual objects it manipulates?
Pollock, John
core  

AI Alignment Versus AI Ethical Treatment: 10 Challenges

open access: yesAnalytic Philosophy, EarlyView.
ABSTRACT A morally acceptable course of AI development should avoid two dangers: creating unaligned AI systems that pose a threat to humanity and mistreating AI systems that merit moral consideration in their own right. This paper argues these two dangers interact and that if we create AI systems that merit moral consideration, simultaneously avoiding ...
Adam Bradley, Bradford Saad
wiley   +1 more source

The Rise of Human–Computer Integration in Marketing: A Theory Synthesis

open access: yesPsychology &Marketing, Volume 43, Issue 6, Page 1343-1380, June 2026.
ABSTRACT Human–computer integration (HCInt) technologies, which merge human bodily, cognitive, and sensory functions with computational processes, are reshaping the foundations of consumer experience. Unlike traditional human–computer interaction, HCInt entails adaptive and reciprocal coupling through AI‐driven augmentation, wearables, muscle–computer ...
Carlos Velasco   +5 more
wiley   +1 more source

EPT Switching vs. Instruction Repair vs. Instruction Emulation: A Performance Comparison of Hyper-Breakpoint Variants

open access: yesEng
Virtual Machine Introspection (VMI) is a powerful technology used to detect and analyze malicious software inside Virtual Machines (VMs) from the outside.
Lukas Beierlieb   +4 more
doaj   +1 more source

Improving Basin‐Wide Flood Estimation From a Global Hydrological Model Through Spatiotemporal‐Pattern‐Based Machine Learning

open access: yesJournal of Flood Risk Management, Volume 19, Issue 2, June 2026.
ABSTRACT When estimating future flood events using a global hydrological model (GHM), the large uncertainties associated with general circulation models (GCMs) and bias in the GHM model pose significant challenges. In the meantime, most future flood estimations are conducted only at specific gauge stations due to limited data availability and are ...
Jiaqing Wang, Quan J. Wang, Jianshi Zhao
wiley   +1 more source

SciTokens: Capability-Based Secure Access to Remote Scientific Data

open access: yes, 2018
The management of security credentials (e.g., passwords, secret keys) for computational science workflows is a burden for scientists and information security officers.
Basney, Jim   +7 more
core   +1 more source

JWalk: a tool for lazy, systematic testing of java classes by design introspection and user interaction [PDF]

open access: yes, 2007
Popular software testing tools, such as JUnit, allow frequent retesting of modified code; yet the manually created test scripts are often seriously incomplete.
A. Petrenko   +32 more
core   +1 more source

Home - About - Disclaimer - Privacy