Search results for "Virtual"

showing 10 items of 1485 documents

Hypervisor-based Protection of Code

2019

The code of a compiled program is susceptible to reverse-engineering attacks on the algorithms and the business logic that are contained within the code. The main existing countermeasure to reverse-engineering is obfuscation. Generally, obfuscation methods suffer from two main deficiencies: 1) the obfuscated code is less efficient than the original and 2) with sufficient effort, the original code may be reconstructed. We propose a method that is based on cryptography and virtualization. The most valuable functions are encrypted and remain inaccessible even during their execution, thus preventing their reconstruction. A specially crafted hypervisor is responsible for decryption, execution, a…

Computer Networks and CommunicationsComputer science0211 other engineering and technologiesCryptography02 engineering and technologysecurityComputer securitycomputer.software_genreEncryptionkryptografiaObfuscationCode (cryptography)tietoturvavirtual machine monitorsSafety Risk Reliability and QualitySystem bustrusted platform moduleta113021110 strategic defence & security studiescode protectioncryptographybusiness.industryHypervisorVirtualizationObfuscation (software)businesscomputerIEEE Transactions on Information Forensics and Security
researchProduct

A VR-Enhanced Rollover Car Simulator and Edutainment Application for Increasing Seat Belt Use Awareness

2021

Most countries have active road safety policies that seek the objective of reducing deaths in traffic accidents. One of the main factors in this regard is the awareness of the safety measures, one of the most important being the correct usage of the seat belt, a device that is known to save thousands of lives every year. The presented work shows a VR-enhanced edutainment application designed to increase awareness on the use of seat belts. For this goal, a motorized rollover system was developed that, synchronized with a VR application (shown in a head-mounted display for each user inside a real car), rolls over this car with up to four passengers inside. This way, users feel the sensations …

Computer Networks and CommunicationsComputer scienceContext (language use)02 engineering and technologySerious gameVirtual realitylaw.inventiontraffic safetyAeronauticslaw0202 electrical engineering electronic engineering information engineeringSeat beltPer capitagamificationawarenessserious gameSeguretat viària05 social sciencesedutainment050301 education020207 software engineeringQA75.5-76.95RolloverHuman-Computer InteractionRisk perceptionPsicologiaWork (electrical)Electronic computers. Computer sciencevirtual realityseat beltrollover simulator0503 educationComputers
researchProduct

SAGECELL: Software-Defined Space-Air-Ground Integrated Moving Cells

2018

Ultra-dense networks (UDNs) provide an effective solution to accommodate the explosively growing data traffic of multimedia services and real-time applications. However, the densification of large numbers of static small cells faces many fundamental challenges, including deployment cost, energy consumption and control, and so on. This motivates us to develop software-defined space-air-ground integrated moving cells (SAGECELL), a programmable, scalable, and flexible framework to integrate space, air, and ground resources for matching dynamic traffic demands with network capacity supplies. First, we provide a comprehensive review of state-of-the-art literature. Then the conceptual architectur…

Computer Networks and CommunicationsComputer scienceDistributed computingInteroperability02 engineering and technologyaerospace electronics0203 mechanical engineering0202 electrical engineering electronic engineering information engineeringresource managementResource managementcomputer architecturevirtual machine monitorsElectrical and Electronic Engineeringta113Flexibility (engineering)ta213Quality of service020206 networking & telecommunications020302 automobile design & engineeringEnergy consumptionmiehittämättömät ilma-aluksetConceptual architectureComputer Science ApplicationsSoftware deploymentScalabilityquality of serviceunmanned aerial vehicleslangattomat verkotIEEE Communications Magazine
researchProduct

A Comparative Evaluation of a Virtual Reality Table and a HoloLens-Based Augmented Reality System for Anatomy Training

2020

Anatomy training with real cadavers poses many practical problems for which new training and educational solutions have been developed making use of technologies based on real-time 3-D graphics. Although virtual reality (VR) and augmented reality (AR) have been previously used in the medical field, it is not easy to select the right 3-D technology or setup for each particular problem. For this reason, this article presents a comprehensive comparative study with 82 participants between two different 3-D interactive setups: an optical-based AR setup, implemented with a Microsoft HoloLens device, and a semi-immersive setup based on a VR Table. Both setups are tested using an anatomy training s…

Computer Networks and CommunicationsComputer sciencebusiness.industry05 social sciences050301 education020207 software engineeringHuman Factors and Ergonomics02 engineering and technologyAnatomyVirtual realityField (computer science)Computer Science ApplicationsComparative evaluationHuman-Computer InteractionSoftwareArtificial IntelligenceControl and Systems EngineeringSignal Processing0202 electrical engineering electronic engineering information engineeringTable (database)Augmented realityGraphicsbusiness0503 educationIEEE Transactions on Human-Machine Systems
researchProduct

Performance comparison of container orchestration platforms with low cost devices in the fog, assisting Internet of Things applications

2020

Abstract In the last decade there has been an increasing interest and demand on the Internet of Things (IoT) and its applications. But, when a high level of computing and/or real time processing is required for these applications, different problems arise due to their requirements. In this context, low cost autonomous and distributed Small Board Computers (SBC) devices, with processing, storage capabilities and wireless communications can assist these IoT networks. Usually, these SBC devices run an operating system based on Linux. In this scenario, container-based technologies and fog computing are an interesting approach and both have led to a new paradigm in how devices cooperate, improvi…

Computer Networks and CommunicationsComputer sciencebusiness.industryDistributed computing020206 networking & telecommunications02 engineering and technologyLoad balancing (computing)Virtualizationcomputer.software_genreNetwork topologyComputer Science ApplicationsHardware and ArchitecturePerformance comparisonScalability0202 electrical engineering electronic engineering information engineeringWireless020201 artificial intelligence & image processingOrchestration (computing)businessInternet of ThingscomputerJournal of Network and Computer Applications
researchProduct

Incentive Mechanism for Resource Allocation in Wireless Virtualized Networks with Multiple Infrastructure Providers

2020

To accommodate the explosively growing demands for mobile traffic service, wireless network virtualization is proposed as the main evolution towards 5G. In this work, a novel contract theoretic incentive mechanism is proposed to study how to manage the resources and provide services to the users in the wireless virtualized networks. We consider that the infrastructure providers (InPs) own the physical networks and the mobile virtual network operator (MVNO) has the service information of the users and needs to lease the physical radio resources for providing services. In particular, we utilize the contract theoretic approach to model the resource trading process between the MVNO and multiple…

Computer Networks and CommunicationsComputer sciencewireless virtualized networkcontract theory02 engineering and technologyresursointicomputer.software_genreresurssitallokointiResource (project management)0202 electrical engineering electronic engineering information engineeringWirelessResource managementElectrical and Electronic EngineeringVirtual networkuser associationbusiness.industryWireless network020206 networking & telecommunicationsVirtualizationpower allocationResource allocationbusinesscomputerSoftware5Glangattomat verkotkannustimetComputer network
researchProduct

Analyzing the performance of a cluster-based architecture for immersive visualization systems

2008

Cluster computing has become an essential issue for designing immersive visualization systems. This paradigm employs scalable clusters of commodity computers with much lower costs than would be possible with the high-end, shared memory computers that have been traditionally used for virtual reality purposes. This change in the design of virtual reality systems has caused some development environments oriented toward shared memory computing to require modifications to their internal architectures in order to support cluster computing. This is the case of VR Juggler, which is considered one of the most important virtual reality application development frameworks based on open source code. Thi…

Computer Networks and Communicationsbusiness.industryComputer scienceVirtual realityModular designcomputer.software_genreTheoretical Computer ScienceVisualizationShared memoryArtificial IntelligenceHardware and ArchitectureHuman–computer interactionComputer clusterScalabilityCluster (physics)Operating systemArchitecturebusinesscomputerSoftwareJournal of Parallel and Distributed Computing
researchProduct

Cognitive assessment of OCD patients: Neurovr vs neuropsychological test

2014

This study aimed to evaluate the reliability and validity of the Neuro- Virtual Reality as tool for the neuropsychological assessment in OCD patients. We used the neuropsychological battery and a virtual version of the Multiple Errand Test (V-MET), developed using the NeuroVR software, in order to evaluate the executive functions, the ability to plan ahead on complex problem solving tasks in daily life in 30 obsessive compulsive disorder (OCD) patients and 30 healthy controls. The results showed the presence of difficulties of OCD patients: lower levels of divided attention and higher levels of errors; higher mean rank of inefficiencies, interpretation failures and rule breaks and longer ti…

Computer Science (all)Virtual RealitySettore M-PSI/03 - PsicometriaReproducibility of Resultsexecutive functions; neuropsychological assessment; Obsessive-compulsive disorder; virtual multiple errands testNeuropsychological TestsMental Status and Dementia Testsexecutive functionsNeuropsychological assessmentVirtual multiple errands testExecutive functionSettore M-PSI/08 - Psicologia ClinicaObsessive-compulsive disorderSettore MED/48 -Scienze Infermierist. e Tecn. Neuro-Psichiatriche e Riabilitat.HumansSettore M-PSI/01 - PSICOLOGIA GENERALESettore MED/25 - Psichiatria
researchProduct

A Similarity Evaluation Technique for Cooperative Problem Solving with a Group of Agents

1999

Evaluation of distance or similarity is very important in cooperative problem solving with a group of agents. Distance between problems is used by agents to recognize nearest solved problems for a new problem, distance between solutions is necessary to compare and evaluate the solutions made by different agents, and distance between agents is useful to evaluate weights of the agents to be able to integrate them by weighted voting. The goal of this paper is to develop a similarity evaluation technique to be used for cooperative problem solving with a group of agents. Virtual training environment used for this goal is represented by predicates that define relationships within three sets: prob…

Computer Science::Multiagent SystemsTheoretical computer scienceSimilarity (network science)Computer scienceGroup (mathematics)business.industryStructure (category theory)Weighted votingInformation systemVirtual trainingArtificial intelligencebusinessCooperative problem solving
researchProduct

Hypervisor-assisted dynamic malware analysis

2021

AbstractMalware analysis is a task of utmost importance in cyber-security. Two approaches exist for malware analysis: static and dynamic. Modern malware uses an abundance of techniques to evade both dynamic and static analysis tools. Current dynamic analysis solutions either make modifications to the running malware or use a higher privilege component that does the actual analysis. The former can be easily detected by sophisticated malware while the latter often induces a significant performance overhead. We propose a method that performs malware analysis within the context of the OS itself. Furthermore, the analysis component is camouflaged by a hypervisor, which makes it completely transp…

Computer engineering. Computer hardwareSoftware_OPERATINGSYSTEMSvirtualisointiComputer Networks and CommunicationsComputer scienceContext (language use)Static program analysiscomputer.software_genreTK7885-7895Artificial IntelligenceComponent (UML)Overhead (computing)tietoturvaMalware analysiskyberturvallisuusbusiness.industryHypervisorQA75.5-76.95haittaohjelmatComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMSTask (computing)Electronic computers. Computer scienceEmbedded systemMalwarebusinesscomputerSoftwareInformation SystemsCybersecurity
researchProduct