Sciweavers

1683 search results - page 256 / 337
» Game Theory Basics
Sort
View
129
Voted
ISAAC
2009
Springer
114views Algorithms» more  ISAAC 2009»
15 years 10 months ago
Good Programming in Transactional Memory
Abstract. In a multicore transactional memory (TM) system, concurrent execution threads interact and interfere with each other through shared memory. The less interference a progra...
Raphael Eidenbenz, Roger Wattenhofer
IVA
2009
Springer
15 years 10 months ago
Methodologies for the User Evaluation of the Motion of Virtual Humans
Abstract. Virtual humans are employed in many interactive applications, including (serious) games. Their motion should be natural and allow interaction with its surroundings and ot...
Sander E. M. Jansen, Herwin van Welbergen
CDC
2008
IEEE
103views Control Systems» more  CDC 2008»
15 years 10 months ago
Symbolic models for nonlinear control systems affected by disturbances
Abstract— Symbolic models are abstract descriptions of continuous systems in which symbols represent aggregates of continuous states. In the last few years there has been a growi...
Giordano Pola, Paulo Tabuada
HICSS
2008
IEEE
150views Biometrics» more  HICSS 2008»
15 years 10 months ago
Quantitative Early-Phase User Research Methods: Hard Data for Initial Product Design
We describe questions that commonly arise in early-phase user research for new technology products concerning customer needs, priorities, and market definition. We suggest that me...
Christopher N. Chapman, Edwin Love, James L. Alfor...
139
Voted
INFOCOM
2007
IEEE
15 years 10 months ago
Malicious Users in Unstructured Networks
—Unstructured networks (like ad-hoc or peer-to-peer networks) are networks without centralized control of their operation. Users make local decisions regarding whether to follow ...
George Theodorakopoulos, John S. Baras