Sciweavers

27 search results - page 5 / 6
» Fighting Censorship with Algorithms
Sort
View
ATAL
2008
Springer
13 years 7 months ago
Demonstration of multi-agent potential fields in real-time strategy games
Bots for Real Time Strategy (RTS) games provide a rich challenge to implement. A bot controls a number of units that may have to navigate in a partially unknown environment, while...
Johan Hagelbäck, Stefan J. Johansson
JVCA
2007
132views more  JVCA 2007»
13 years 5 months ago
Interactive and flexible motion transition
In this paper, we present an example-based motion synthesis technique. Users can interactively control the virtual character to perform desired actions in any order. The desired a...
Jen-Yu Peng, I-Chen Lin, Jui-Hsiang Chao, Yan-Ju C...
CORR
2008
Springer
98views Education» more  CORR 2008»
13 years 5 months ago
An Information-Theoretical View of Network-Aware Malware Attacks
This work investigates three aspects: (a) a network vulnerability as the non-uniform vulnerable-host distribution, (b) threats, i.e., intelligent malwares that exploit such a vulne...
Zesheng Chen, Chuanyi Ji
KDD
2006
ACM
381views Data Mining» more  KDD 2006»
14 years 6 months ago
GPLAG: detection of software plagiarism by program dependence graph analysis
Along with the blossom of open source projects comes the convenience for software plagiarism. A company, if less self-disciplined, may be tempted to plagiarize some open source pr...
Chao Liu 0001, Chen Chen, Jiawei Han, Philip S. Yu
ATAL
2008
Springer
13 years 7 months ago
Using multi-agent potential fields in real-time strategy games
Bots for Real Time Strategy (RTS) games provide a rich challenge to implement. A bot controls a number of units that may have to navigate in a partially unknown environment, while...
Johan Hagelbäck, Stefan J. Johansson