Sciweavers

1186 search results - page 128 / 238
» Analysis of Virtual Workspaces
Sort
View
CSCW
2012
ACM
12 years 4 months ago
Come meet me at Ulduar: progression raiding in world of warcraft
In spite of decades of research on virtual worlds, our understanding of one popular form of virtual world behavior— raiding—remains limited. Raiding is important because it en...
Jeffrey Bardzell, Jeffrey Nichols, Tyler Pace, Sha...
ICDE
2012
IEEE
267views Database» more  ICDE 2012»
11 years 11 months ago
Scalable and Numerically Stable Descriptive Statistics in SystemML
—With the exponential growth in the amount of data that is being generated in recent years, there is a pressing need for applying machine learning algorithms to large data sets. ...
Yuanyuan Tian, Shirish Tatikonda, Berthold Reinwal...
AAAI
2012
11 years 11 months ago
Identifying Bullies with a Computer Game
Current computer involvement in adolescent social networks (youth between the ages of 11 and 17) provides new opportunities to study group dynamics, interactions amongst peers, an...
Juan Fernando Mancilla-Caceres, Wen Pu, Eyal Amir,...
VRST
2010
ACM
13 years 6 months ago
Region-of-interest volumetric visual hull refinement
This paper introduces a region-of-interest visual hull refinement technique, based on flexible voxel grids for volumetric visual hull reconstructions. Region-of-interest refinemen...
Daniel Knoblauch, Falko Kuester
CCS
2007
ACM
14 years 3 months ago
Yet another MicroArchitectural Attack: : exploiting I-Cache
Abstract. MicroArchitectural Attacks (MA), which can be considered as a special form of SideChannel Analysis, exploit microarchitectural functionalities of processor implementation...
Onur Aciiçmez