Sciweavers

1176 search results - page 57 / 236
» Exploiting Online Games
Sort
View
DATE
2005
IEEE
129views Hardware» more  DATE 2005»
14 years 3 months ago
Exploiting Dynamic Workload Variation in Low Energy Preemptive Task Scheduling
A novel energy reduction strategy to maximally exploit the dynamic workload variation is proposed for the offline voltage scheduling of preemptive systems. The idea is to construc...
Lap-Fai Leung, Chi-Ying Tsui, Xiaobo Sharon Hu
CVPR
2012
IEEE
12 years 2 months ago
Stream-based Joint Exploration-Exploitation Active Learning
Learning from streams of evolving and unbounded data is an important problem, for example in visual surveillance or internet scale data. For such large and evolving real-world data...
Chen Change Loy, Timothy M. Hospedales, Tao Xiang,...
RP
2009
Springer
121views Control Systems» more  RP 2009»
14 years 4 months ago
Games with Opacity Condition
We describe the class of games with opacity condition, as an adequate model for security aspects of computing systems. We study their theoretical properties, relate them to reachab...
Bastien Maubert, Sophie Pinchinat
AAAI
2010
13 years 11 months ago
Collusion Detection in Online Bridge
Collusion is a major unsolved security problem in online bridge: by illicitly exchanging card information over the telephone, instant messenger or the like, cheaters can gain huge...
Jeff Yan
SCAM
2006
IEEE
14 years 3 months ago
Characterising, Explaining, and Exploiting the Approximate Nature of Static Analysis through Animation
This paper addresses the question: “How can animated visualisation be used to express interesting properties of static analysis?” The particular focus is upon static dependenc...
David Binkley, Mark Harman, Jens Krinke