Sciweavers

512 search results - page 78 / 103
» A Motivation-Based Mechanism to Design Behaviors
Sort
View
DSN
2005
IEEE
14 years 1 months ago
Detecting Stealth Software with Strider GhostBuster
Stealth malware programs that silently infect enterprise and consumer machines are becoming a major threat to the future of the Internet [XZ04]. Resource hiding is a powerful stea...
Yi-Min Wang, Doug Beck, Binh Vo, Roussi Roussev, C...
ACMACE
2005
ACM
14 years 1 months ago
An extensible platform for interactive, entertaining social experiences with an animatronic character
The fields of human-robot interaction and entertainment robotics are truly interdisciplinary, combining the best of computer science, psychology, and mechanical engineering. Howe...
Sabrina A. Haskell, Andrew Hosmer, Eugenia Leu
ATAL
2005
Springer
14 years 1 months ago
Automatic computer game balancing: a reinforcement learning approach
Designing agents whose behavior challenges human players adequately is a key issue in computer games development. This work presents a novel technique, based on reinforcement lear...
Gustavo Andrade, Geber Ramalho, Hugo Santana, Vinc...
CSCW
2004
ACM
14 years 1 months ago
Beyond "social protocols": multi-user coordination policies for co-located groupware
The status quo for co-located groupware is to assume that “social protocols” (standards of polite behavior) are sufficient to coordinate the actions of a group of users; howev...
Meredith Ringel Morris, Kathy Ryall, Chia Shen, Cl...
DATE
2003
IEEE
94views Hardware» more  DATE 2003»
14 years 1 months ago
Reducing Power Consumption for High-Associativity Data Caches in Embedded Processors
Modern embedded processors use data caches with higher and higher degrees of associativity in order to increase performance. A set–associative data cache consumes a significant...
Dan Nicolaescu, Alexander V. Veidenbaum, Alexandru...