Sciweavers

1092 search results - page 195 / 219
» Do summaries help
Sort
View
152
Voted
OOPSLA
1997
Springer
15 years 7 months ago
Composite Design Patterns
ed Abstract Factory is yet another. When patterns cooperate, the cooperation itself can give rise to problems, contexts, trade-offs, and consequences. For instance, should a Visito...
Dirk Riehle
148
Voted
PLDI
1994
ACM
15 years 7 months ago
Memory Access Coalescing: A technique for Eliminating Redundant memory Accesses
As microprocessor speeds increase, memory bandwidth is increasing y the performance bottleneck for microprocessors. This has occurred because innovation and technological improvem...
Jack W. Davidson, Sanjay Jinturkar
144
Voted
WG
1994
Springer
15 years 7 months ago
Fugitive-Search Games on Graphs and Related Parameters
The goal of a fugitive-search game on a graph is to trap a fugitive that hides on the vertices of the graph by systematically placing searchers on the vertices. The fugitive is as...
Nick D. Dendris, Lefteris M. Kirousis, Dimitrios M...
134
Voted
ACMACE
2007
ACM
15 years 7 months ago
Tangible interfaces for real-time 3D virtual environments
Emergent game formats, such as machinima, that use game worlds as expressive 3D performance spaces have new expressive powers with an increase of the quality of their underlying g...
Ali Mazalek, Michael Nitsche
163
Voted
CIE
2007
Springer
15 years 7 months ago
A Classification of Viruses Through Recursion Theorems
We study computer virology from an abstract point of view. Viruses and worms are self-replicating programs, whose constructions are essentially based on Kleene's second recurs...
Guillaume Bonfante, Matthieu Kaczmarek, Jean-Yves ...