Sciweavers

1176 search results - page 62 / 236
» Exploiting Online Games
Sort
View
AIIDE
2006
13 years 11 months ago
The NERO Video Game
In most modern video games, character behavior is scripted; no matter how many times the player exploits a weakness, that weakness is never repaired. Yet if game characters could ...
Kenneth O. Stanley, Igor Karpov, Risto Miikkulaine...
ATAL
2010
Springer
13 years 10 months ago
Enumeration and exact design of weighted voting games
In many multiagent settings, situations arise in which agents must collectively make decisions while not every agent is supposed to have an equal amount of influence in the outcom...
Bart de Keijzer, Tomas Klos, Yingqian Zhang
JUCS
2008
281views more  JUCS 2008»
13 years 9 months ago
Creating Adaptive e-Learning Board Games for School Settings Using the ELG Environment
: The use of digital games in education is well documented in the literature. They have been used in preschool, K-12, the university. A specific type of digital games is board game...
Symeon Retalis
SIGMOD
2009
ACM
130views Database» more  SIGMOD 2009»
14 years 10 months ago
FlashLogging: exploiting flash devices for synchronous logging performance
Synchronous transactional logging is the central mechanism for ensuring data persistency and recoverability in database systems. Unfortunately, magnetic disks are ill-suited for t...
Shimin Chen
RTSS
2005
IEEE
14 years 3 months ago
ParaScale: Exploiting Parametric Timing Analysis for Real-Time Schedulers and Dynamic Voltage Scaling
Static timing analysis safely bounds worst-case execution times to determine if tasks can meet their deadlines in hard real-time systems. However, conventional timing analysis req...
Sibin Mohan, Frank Mueller, William Hawkins, Micha...