Sciweavers

1993 search results - page 359 / 399
» On Action Theory Change
Sort
View
ASPLOS
2006
ACM
14 years 1 months ago
Comprehensively and efficiently protecting the heap
The goal of this paper is to propose a scheme that provides comprehensive security protection for the heap. Heap vulnerabilities are increasingly being exploited for attacks on co...
Mazen Kharbutli, Xiaowei Jiang, Yan Solihin, Guru ...
ATAL
2006
Springer
14 years 1 months ago
Evolutionary Stability of Behavioural Types in the Continuous Double Auction
In this paper, we investigate the effectiveness of different types of bidding behaviour for trading agents in the Continuous Double Auction (CDA). Specifically, we consider behavi...
Perukrishnen Vytelingum, Dave Cliff, Nicholas R. J...
FPL
2004
Springer
164views Hardware» more  FPL 2004»
14 years 1 months ago
Dynamic Prefetching in the Virtual Memory Window of Portable Reconfigurable Coprocessors
Abstract. In Reconfigurable Systems-On-Chip (RSoCs), operating systems can primarily (1) manage the sharing of limited reconfigurable resources, and (2) support communication betwe...
Miljan Vuletic, Laura Pozzi, Paolo Ienne
CIKM
2008
Springer
13 years 12 months ago
Matching task profiles and user needs in personalized web search
Personalization has been deemed one of the major challenges in information retrieval with a significant potential for providing better search experience to individual users. Espec...
Julia Luxenburger, Shady Elbassuoni, Gerhard Weiku...
AIIDE
2006
13 years 11 months ago
Mixing Story and Simulation in Interactive Narrative
Simulation is a common feature in computer entertainment. However, in computer games simulation and story are often kept distinct by interleaving interactive play and cut scenes. ...
Mark O. Riedl, Andrew Stern, Don M. Dini