Sciweavers

1502 search results - page 193 / 301
» The new face of war
Sort
View
CHI
2004
ACM
14 years 10 months ago
Using heuristics to evaluate the playability of games
Heuristics have become an accepted and widely used adjunct method of usability evaluation in Internet and software development. This report introduces Heuristic Evaluation for Pla...
Heather Desurvire, Martin Caplan, Jozsef A. Toth
SIGMOD
2007
ACM
123views Database» more  SIGMOD 2007»
14 years 10 months ago
Schema advisor for hybrid relational-XML DBMS
In response to the widespread use of the XML format for document representation and message exchange, major database vendors support XML in terms of persistence, querying and inde...
Mirella Moura Moro, Lipyeow Lim, Yuan-Chi Chang
EDBT
2008
ACM
154views Database» more  EDBT 2008»
14 years 10 months ago
Anonymity for continuous data publishing
k-anonymization is an important privacy protection mechanism in data publishing. While there has been a great deal of work in recent years, almost all considered a single static r...
Benjamin C. M. Fung, Ke Wang, Ada Wai-Chee Fu, Jia...
DCC
2005
IEEE
14 years 10 months ago
TetStreamer: Compressed Back-to-Front Transmission of Delaunay Tetrahedra Meshes
We use the abbreviations tet and tri for tetrahedron and triangle. TetStreamer encodes a Delaunay tet mesh in a back-to-front visibility order and streams it from a server to a cl...
Urs Bischoff, Jarek Rossignac
ICCAD
2005
IEEE
151views Hardware» more  ICCAD 2005»
14 years 7 months ago
Architecture and details of a high quality, large-scale analytical placer
Modern design requirements have brought additional complexities to netlists and layouts. Millions of components, whitespace resources, and fixed/movable blocks are just a few to ...
Andrew B. Kahng, Sherief Reda, Qinke Wang