Fred Stakem

Learn More
ly, kernel-level rootkits are similar to user-level rootkits. They replace known good state with malicious state. However, the details of kernel-level rootkits are much more complicated than user-level rootkits. Kernel-level rootkits modify running kernel code, which can drastically effect the stability of the system. Previously seen rootkits will modify(More)
Although Collaborative Virtual Environments share many characteristics in common with first person 3D games, CVEs strive for a deeper level of immersion by networking together individuals with more natural input devices. More complex input devices such as data gloves and positional trackers have additional processing delay and when compounded with network(More)
Virtual reality is a useful tool to train individuals for various different situations or scenarios. A single person utilizing a virtual environment can greatly enhance their skill set, but the greatest gain in skill is obtained when multiple users realistically interact in the virtual environment. To accomplish this, a network protocol must be designed to(More)
Whether interacting with a collaborative virtual environment, or CVE, locally or one networked across the Internet, any delay in the system can lead to a reduced sense of immersion. Input sensor delay and network delay are two common problems in CVE design that can be overcome with the application of prediction algorithms to the system. The purpose of this(More)
Creating an immersive experience in a collaborative virtual environment, or CVE, involves more than just high definition graphics and expensive hardware. An immersive experience requires participant’s input to be translated in a timely fashion to the local environment as well as to others connected across the internet. A well designed prediction algorithm(More)
  • 1