Sciweavers

10792 search results - page 2120 / 2159
» An Evaluation of Non-Equijoin Algorithms
Sort
View
ATAL
2008
Springer
13 years 12 months ago
Using multi-agent potential fields in real-time strategy games
Bots for Real Time Strategy (RTS) games provide a rich challenge to implement. A bot controls a number of units that may have to navigate in a partially unknown environment, while...
Johan Hagelbäck, Stefan J. Johansson
CCS
2008
ACM
13 years 12 months ago
Authenticated hash tables
Hash tables are fundamental data structures that optimally answer membership queries. Suppose a client stores n elements in a hash table that is outsourced at a remote server so t...
Charalampos Papamanthou, Roberto Tamassia, Nikos T...
ISSTA
2010
ACM
13 years 12 months ago
Perturbing numerical calculations for statistical analysis of floating-point program (in)stability
Writing reliable software is difficult. It becomes even more difficult when writing scientific software involving floating-point numbers. Computers provide numbers with limite...
Enyi Tang, Earl T. Barr, Xuandong Li, Zhendong Su
CGO
2008
IEEE
13 years 12 months ago
Comprehensive path-sensitive data-flow analysis
Data-flow analysis is an integral part of any aggressive optimizing compiler. We propose a framework for improving the precision of data-flow analysis in the presence of complex c...
Aditya V. Thakur, R. Govindarajan
CIKM
2008
Springer
13 years 12 months ago
To swing or not to swing: learning when (not) to advertise
Web textual advertising can be interpreted as a search problem over the corpus of ads available for display in a particular context. In contrast to conventional information retrie...
Andrei Z. Broder, Massimiliano Ciaramita, Marcus F...
« Prev « First page 2120 / 2159 Last » Next »