Results 61 to 70 of about 17,865 (172)
Through My Eyes: Integrative Model of Awareness‐Raising (IMAR)
Thanks to the phenomena of presence and embodiment, immersive virtual reality makes it possible to create situations that influence users’ mental representations. This can deepen understanding of another person’s perspective and foster compassion and motivation for prosocial behavior.
Abdelmajid Kadri +3 more
wiley +1 more source
The article discusses ways to get the content of files, which are modified during the processing in the well-known open source dynamic analysis environment Drakvuf.
S. G. Kovalev
doaj
Commentary on “An alternative to working on machine consciousness”, by Aaron Sloman [PDF]
A commentary on a current paper by Aaron Sloman where he argues that in order to make progress in AI, consciousness (and other such unclear concepts of common-sense regarding the mind), "should be replaced by more precise and varied architecture-based ...
Legg, Catherine
core
Functionalism, revisionism, and qualia [PDF]
From the editor's introduction: "Ron Chrisley and Aaron Sloman open Part I of this issue with their article “Functionalism, Revisionism, and Qualia.” Chrisley and Sloman discuss revisionism about qualia—the view that tries to navigate between naïve ...
Chrisley, Ron, Sloman, Aaron
core
Thumbs up? Sentiment Classification using Machine Learning Techniques
We consider the problem of classifying documents not by topic, but by overall sentiment, e.g., determining whether a review is positive or negative. Using movie reviews as data, we find that standard machine learning techniques definitively outperform ...
Lee, Lillian +2 more
core +4 more sources
Hypervisor Integrity Measurement Assistant [PDF]
An attacker who has gained access to a computer may want to upload or modify configuration files, etc., and run arbitrary programs of his choice. We can severely restrict the power of the attacker by having a white-list of approved file checksums and ...
Rajabi Nasab, Mazdak, Rasmusson, Lars
core +1 more source
Investigating the Implications of Virtual Machine Introspection for Digital Forensics [PDF]
Researchers and practitioners in computer forensics currently must base their analysis on information that is either incomplete or produced by tools that may themselves be compromised as a result of the intrusion.
Bishop, Matt, Hay, Brian, Nance, Kara
core
Benchmarking Hyper-Breakpoints for Efficient Virtual Machine Introspection
Virtual Machine Introspection (VMI) is a powerful technology used to detect and analyze malicious software inside Virtual Machines (VMs) from outside. Asynchronously accessing the VM’s memory can be insufficient for efficiently monitoring what is happening inside of a VM.
Lukas Beierlieb +4 more
openaire +1 more source
Knowledge modeling for software design [PDF]
This paper develops a modeling framework for systems engineering that encompasses systems modeling, task modeling, and knowledge modeling, and allows knowledge engineering and software engineering to be seen as part of a unified developmental process ...
Gaines, Brian R., Shaw, Mildred L. G.
core +1 more source
RISE: an open-source architecture for interdisciplinary and reproducible human-robot interaction research. [PDF]
Groß A +4 more
europepmc +1 more source

