Sciweavers

1280 search results - page 185 / 256
» Soft Typing with Conditional Types
Sort
View
AGENTS
2001
Springer
14 years 1 months ago
Is the wolf angry or ... just hungry?
In this paper we will discuss different types of control over synthetic characters in interactive stories. We will argue that, to attain a deeper and more engaging control, in ce...
Isabel Machado, Ana Paiva, Rui Prada
ICOIN
2001
Springer
14 years 1 months ago
Integrated Transport Layer Security: End-to-End Security Model between WTLS and TLS
WAP is a set of protocols that optimizes standard TCP/IP/HTTP/HTML protocols, for use under the low bandwidth, high latency conditions often found in wireless networks. But, end-t...
Eun-Kyeong Kwon, Yong-Gu Cho, Ki-Joon Chae
SAFECOMP
2001
Springer
14 years 1 months ago
An Investigation on Mutation Strategies for Fault Injection into RDD-100 Models
This paper focuses on the development of a conceptual framework for integrating fault injection mechanisms into the RDD-100 tool2 to support the dependability analysis of computer...
Mohamed Kaâniche, Yannick Le Guédart,...
WISE
2000
Springer
14 years 1 months ago
Searching the Web Using a Map
Most Internet search engines are keyword-based. They are not efficient for the queries where geographical location is important, such as finding hotels within an area or close to ...
Joseph D. Yates, Xiaofang Zhou
PODC
1999
ACM
14 years 1 months ago
On k-Set Consensus Problems in Asynchronous Systems
ÐIn this paper, we investigate the k-set consensus problem in asynchronous distributed systems. In this problem, each participating process begins the protocol with an input value...
Roberto De Prisco, Dahlia Malkhi, Michael K. Reite...