Sciweavers

325 search results - page 63 / 65
» Extending an Algebraic Modeling Language to Support Constrai...
Sort
View
KBSE
2005
IEEE
14 years 1 months ago
Designing and implementing a family of intrusion detection systems
Intrusion detection systems are distributed applications that analyze the events in a networked system to identify malicious behavior. The analysis is performed using a number of ...
Richard A. Kemmerer
ICALP
2009
Springer
14 years 8 months ago
Dynamic Succinct Ordered Trees
Abstract. We study the problem of maintaining a dynamic tree succinctly, in 2n + o(n) bits, under updates of the following form: insertion or deletion of a leaf, insertion of a nod...
Arash Farzan, J. Ian Munro
AAAI
2006
13 years 9 months ago
ScriptEase - Motivational Behaviors for Interactive Characters in Computer Role-Playing Games
ScriptEase is a tool that allows authors with no programming experience to create interactive stories for computer role-playing games. Instead of writing scripting code manually, ...
Maria Cutumisu, Duane Szafron, Jonathan Schaeffer,...
VEE
2005
ACM
143views Virtualization» more  VEE 2005»
14 years 1 months ago
Optimized interval splitting in a linear scan register allocator
We present an optimized implementation of the linear scan register allocation algorithm for Sun Microsystems’ Java HotSpotTM client compiler. Linear scan register allocation is ...
Christian Wimmer, Hanspeter Mössenböck
KI
2012
Springer
12 years 3 months ago
Agreeing on Role Adoption in Open Organisations
The organisational specification of a multi-agent system supports agents’ effectiveness in attaining their purpose, or prevent certain undesired behaviour from occurring. This r...
Huib Aldewereld, Virginia Dignum, Catholijn M. Jon...