Sciweavers

2913 search results - page 80 / 583
» How Much to Copy
Sort
View
EL
2002
134views more  EL 2002»
13 years 10 months ago
Security issues in online games
The traditional target of computer game security is mainly copy protection. The emergence of online games fundamentally changes the security requirements for computer games. Althou...
Jianxin Jeff Yan, Hyun-Jin Choi
AGENTS
1997
Springer
14 years 2 months ago
High-Level Planning and Low-Level Execution: Towards a Complete Robotic Agent
We have been developing Rogue, an architecture that integrates high-level planning with a low-level executing robotic agent. Rogue is designed as the oce gofer task planner for X...
Karen Zita Haigh, Manuela M. Veloso
RECOMB
2008
Springer
14 years 10 months ago
Estimating the Relative Contributions of New Genes from Retrotransposition and Segmental Duplication Events during Mammalian Evo
Gene duplication has long been recognized as a major force in genome evolution and has recently been recognized as an important source of individual variation. For many years the o...
Jin Jun, Paul Ryvkin, Edward Hemphill, Ion I. Mand...
KDD
2008
ACM
199views Data Mining» more  KDD 2008»
14 years 10 months ago
Efficient computation of personal aggregate queries on blogs
There is an exploding amount of user-generated content on the Web due to the emergence of "Web 2.0" services, such as Blogger, MySpace, Flickr, and del.icio.us. The part...
Ka Cheung Sia, Junghoo Cho, Yun Chi, Belle L. Tsen...
ISPD
2009
ACM
141views Hardware» more  ISPD 2009»
14 years 4 months ago
A faster approximation scheme for timing driven minimum cost layer assignment
As VLSI technology moves to the 65nm node and beyond, interconnect delay greatly limits the circuit performance. As a critical component in interconnect synthesis, layer assignmen...
Shiyan Hu, Zhuo Li, Charles J. Alpert