Sciweavers

1016 search results - page 87 / 204
» Explore or Exploit
Sort
View
EURONGI
2005
Springer
14 years 2 months ago
P2P-Based Mobility Management for Heterogeneous Wireless Networks and Mesh Networks
Abstract. The recent emergence of a whole plethora of new wireless technologies, such as IEEE802.15, IEEE802.11, and UMTS, etc, has exposed the limitations of mobility solutions in...
Amine M. Houyou, Hermann de Meer, Moritz Esterhazy
NOSSDAV
2005
Springer
14 years 2 months ago
Mitigating information exposure to cheaters in real-time strategy games
Cheating in on-line games is a prevalent problem for both game makers and players. The popular real-time strategy game genre is especially vulnerable to cheats, as it is frequentl...
Chris Chambers, Wu-chang Feng, Wu-chi Feng, Debanj...
ECWEB
2005
Springer
149views ECommerce» more  ECWEB 2005»
14 years 2 months ago
Architecture of a Semantic XPath Processor. Application to Digital Rights Management
This work describes a novel strategy for designing an XPath processor that acts over an RDF mapping of XML. We use a modelmapping approach to represent instances of XML and XML Sch...
Rubén Tous, Roberto García, Eva Rodr...
ATVA
2004
Springer
87views Hardware» more  ATVA 2004»
14 years 2 months ago
Synthesis of State Feedback Controllers for Parameterized Discrete Event Systems
— This paper considers the state feedback control of parameterized discrete event systems consisting of N similar processes for the problem of maintaining a predicate on the stat...
Hans Bherer, Jules Desharnais, Marc Frappier, Rich...
XSYM
2004
Springer
109views Database» more  XSYM 2004»
14 years 2 months ago
Implementing Memoization in a Streaming XQuery Processor
In this paper, we describe an approach to boosting the performance of an XQuery engine by identifying and exploiting opportunities to share processing both within and across XML qu...
Yanlei Diao, Daniela Florescu, Donald Kossmann, Mi...