Sciweavers

5864 search results - page 1151 / 1173
» Can We Work around Numerical Methods
Sort
View
DIGRA
2005
Springer
14 years 2 months ago
Fictive affinities in Final Fantasy XI: complicit and critical play in fantastic nations.
Like many massively-multiplayer role-playing games, Final Fantasy XI is a persistent world with a heroic fantasy setting. This paper discusses fictive player identities, and descr...
William Huber
CASES
2004
ACM
14 years 1 months ago
Safely exploiting multithreaded processors to tolerate memory latency in real-time systems
A coarse-grain multithreaded processor can effectively hide long memory latencies by quickly switching to an alternate task when the active task issues a memory request, improving...
Ali El-Haj-Mahmoud, Eric Rotenberg
MOBICOM
2004
ACM
14 years 1 months ago
Localization for mobile sensor networks
Many sensor network applications require location awareness, but it is often too expensive to include a GPS receiver in a sensor network node. Hence, localization schemes for sens...
Lingxuan Hu, David Evans
HT
2000
ACM
14 years 26 days ago
Reusable hypertext structures for distance and JIT learning
Software components for distance and just-in-time (JIT) learning are an increasingly common method of encouraging reuse and facilitating the development process[58], but no analog...
Anne Morgan Spalter, Rosemary Michelle Simpson
GECCO
2006
Springer
215views Optimization» more  GECCO 2006»
14 years 4 days ago
A multi-chromosome approach to standard and embedded cartesian genetic programming
Embedded Cartesian Genetic Programming (ECGP) is an extension of Cartesian Genetic Programming (CGP) that can automatically acquire, evolve and re-use partial solutions in the for...
James Alfred Walker, Julian Francis Miller, Rachel...
« Prev « First page 1151 / 1173 Last » Next »