Results 61 to 70 of about 17,865 (172)

Through My Eyes: Integrative Model of Awareness‐Raising (IMAR)

open access: yesHuman Behavior and Emerging Technologies, Volume 2026, Issue 1, 2026.
Thanks to the phenomena of presence and embodiment, immersive virtual reality makes it possible to create situations that influence users’ mental representations. This can deepen understanding of another person’s perspective and foster compassion and motivation for prosocial behavior.
Abdelmajid Kadri   +3 more
wiley   +1 more source

Reading the contents of deleted and modified files in the virtualization based black-box binary analysis system Drakvuf

open access: yesТруды Института системного программирования РАН, 2018
The article discusses ways to get the content of files, which are modified during the processing in the well-known open source dynamic analysis environment Drakvuf.
S. G. Kovalev
doaj  

Commentary on “An alternative to working on machine consciousness”, by Aaron Sloman [PDF]

open access: yes, 2009
A commentary on a current paper by Aaron Sloman where he argues that in order to make progress in AI, consciousness (and other such unclear concepts of common-sense regarding the mind), "should be replaced by more precise and varied architecture-based ...
Legg, Catherine
core  

Functionalism, revisionism, and qualia [PDF]

open access: yes, 2016
From the editor's introduction: "Ron Chrisley and Aaron Sloman open Part I of this issue with their article “Functionalism, Revisionism, and Qualia.” Chrisley and Sloman discuss revisionism about qualia—the view that tries to navigate between naïve ...
Chrisley, Ron, Sloman, Aaron
core  

Thumbs up? Sentiment Classification using Machine Learning Techniques

open access: yes, 2002
We consider the problem of classifying documents not by topic, but by overall sentiment, e.g., determining whether a review is positive or negative. Using movie reviews as data, we find that standard machine learning techniques definitively outperform ...
Lee, Lillian   +2 more
core   +4 more sources

Hypervisor Integrity Measurement Assistant [PDF]

open access: yes, 2012
An attacker who has gained access to a computer may want to upload or modify configuration files, etc., and run arbitrary programs of his choice. We can severely restrict the power of the attacker by having a white-list of approved file checksums and ...
Rajabi Nasab, Mazdak, Rasmusson, Lars
core   +1 more source

Investigating the Implications of Virtual Machine Introspection for Digital Forensics [PDF]

open access: yes, 2009
Researchers and practitioners in computer forensics currently must base their analysis on information that is either incomplete or produced by tools that may themselves be compromised as a result of the intrusion.
Bishop, Matt, Hay, Brian, Nance, Kara
core  

Benchmarking Hyper-Breakpoints for Efficient Virtual Machine Introspection

open access: yesElectronics
Virtual Machine Introspection (VMI) is a powerful technology used to detect and analyze malicious software inside Virtual Machines (VMs) from outside. Asynchronously accessing the VM’s memory can be insufficient for efficiently monitoring what is happening inside of a VM.
Lukas Beierlieb   +4 more
openaire   +1 more source

Knowledge modeling for software design [PDF]

open access: yes
This paper develops a modeling framework for systems engineering that encompasses systems modeling, task modeling, and knowledge modeling, and allows knowledge engineering and software engineering to be seen as part of a unified developmental process ...
Gaines, Brian R., Shaw, Mildred L. G.
core   +1 more source

Home - About - Disclaimer - Privacy