Sciweavers

203 search results - page 34 / 41
» Some thoughts on hypercomputation
Sort
View
ISW
2007
Springer
14 years 1 months ago
Detecting System Emulators
Malware analysis is the process of determining the behavior and purpose of a given malware sample (such as a virus, worm, or Trojan horse). This process is a necessary step to be a...
Thomas Raffetseder, Christopher Krügel, Engin...
JCDL
2006
ACM
147views Education» more  JCDL 2006»
14 years 1 months ago
The social life of books in the humane library
The development of public libraries may have inadvertently brought the age of marginalia to a close but the advent of digital libraries could revive the practice of marginal annot...
Yoram Chisik, Nancy Kaplan
FOCS
2005
IEEE
14 years 1 months ago
How to Pay, Come What May: Approximation Algorithms for Demand-Robust Covering Problems
Robust optimization has traditionally focused on uncertainty in data and costs in optimization problems to formulate models whose solutions will be optimal in the worstcase among ...
Kedar Dhamdhere, Vineet Goyal, R. Ravi, Mohit Sing...
DIGRA
2005
Springer
14 years 1 months ago
/hide: The aesthetics of group and solo play
In this essay, I examine differences between individual and social play and, in particular, the differences between individual and social play within digital media forms designed ...
David Myers
DIGRA
2005
Springer
14 years 1 months ago
A Cognitive Psychological Approach to Gameplay Emotions
Although emotions elicited by the fictional world or the artefact play a part in story-driven video games, they are certainly not the focus of the experience. From a cognitive psy...
Bernard Perron