Sciweavers

7167 search results - page 1184 / 1434
» Answer Set Programming
Sort
View
IPPS
2006
IEEE
15 years 8 months ago
Reducing the associativity and size of step caches in CRCW operation
Step caches are caches in which data entered to an cache array is kept valid only until the end of ongoing step of execution. Together with an advanced pipelined multithreaded arc...
M. Forsell
IRI
2006
IEEE
15 years 8 months ago
A similarity based technique for detecting malicious executable files for computer forensics
With the rapidly increasing complexity of computer systems and the sophistication of hacking tools and techniques, there is a crucial need for computer forensic analysis technique...
Jun-Hyung Park, Minsoo Kim, BongNam Noh, James B. ...
ISCAS
2006
IEEE
112views Hardware» more  ISCAS 2006»
15 years 8 months ago
Towards an optimised VLSI design algorithm for the constant matrix multiplication problem
The efficient design of multiplierless implementa- The goal is to find the optimal sub-expressions across all N dot tions of constant matrix multipliers is challenged by the huge p...
Andrew Kinane, Valentin Muresan, Noel E. O'Connor
SCAM
2006
IEEE
15 years 8 months ago
Characterising, Explaining, and Exploiting the Approximate Nature of Static Analysis through Animation
This paper addresses the question: “How can animated visualisation be used to express interesting properties of static analysis?” The particular focus is upon static dependenc...
David Binkley, Mark Harman, Jens Krinke
ACMACE
2006
ACM
15 years 8 months ago
Motivated reinforcement learning for non-player characters in persistent computer game worlds
Massively multiplayer online computer games are played in complex, persistent virtual worlds. Over time, the landscape of these worlds evolves and changes as players create and pe...
Kathryn Elizabeth Merrick, Mary Lou Maher
« Prev « First page 1184 / 1434 Last » Next »