Sciweavers

5675 search results - page 38 / 1135
» Exploiting Chaos for Computation
Sort
View
ACMACE
2010
ACM
13 years 6 months ago
Exploiting MMORPG log data toward efficient RMT player detection
To detect players who are engaged in real-money trading (RMT) in massively multi-player online role-playing games (MMORPGs), behavior of players was analyzed using log data of a c...
Hiroshi Itsuki, Asuka Takeuchi, Atsushi Fujita, Hi...
JMLR
2010
118views more  JMLR 2010»
13 years 5 months ago
Exploiting Within-Clique Factorizations in Junction-Tree Algorithms
It is probably fair to say that exact inference in graphical models is considered a solved problem, at least regarding its computational complexity: it is exponential in the treew...
Julian John McAuley, Tibério S. Caetano
IPPS
2006
IEEE
14 years 5 months ago
Exploiting dynamic proxies in middleware for distributed, parallel, and mobile Java applications
Babylon v2.0 is a collection of tools and services that provide a 100% Java compatible environment for developing, running and managing parallel, distributed and mobile Java appli...
Willem van Heiningen, Tim Brecht, Steve MacDonald
ACIVS
2010
Springer
13 years 9 months ago
Exploiting Neighbors for Faster Scanning Window Detection in Images
Detection of objects through scanning windows is widely used and accepted method. The detectors traditionally do not make use of information that is shared between neighboring imag...
Pavel Zemcík, Michal Hradis, Adam Herout
HPCS
2002
IEEE
14 years 3 months ago
An Evaluation of Thread Migration for Exploiting Distributed Array Locality
Thread migration is one approach to remote memory accesses on distributed memory parallel computers. In thread migration, threads of control migrate between processors to access d...
Stephen Jenks, Jean-Luc Gaudiot