Sciweavers

29046 search results - page 211 / 5810
» Computable Models
Sort
View
SP
1987
IEEE
118views Security Privacy» more  SP 1987»
15 years 7 months ago
A Comparison of Commercial and Military Computer Security Policies
Most discussions of computer security focus on control of disclosure. In Particular, the U.S. Department of Defense has developed a set of criteria for computer mechanisms to prov...
D. D. Clark, D. R. Wilson
FEDCSIS
2011
113views more  FEDCSIS 2011»
14 years 3 months ago
Automatic Speech Recognition for Polish in a Computer Game Interface
—The paper describes the process of designing a task-oriented continuous speech recognition system for Polish, based on CMU Sphinx4, to be used in the voice interface of a comput...
Artur Janicki, Dariusz Wawer
114
Voted
CORR
2010
Springer
112views Education» more  CORR 2010»
15 years 3 months ago
Transdichotomous Results in Computational Geometry, II: Offline Search
We reexamine fundamental problems from computational geometry in the word RAM model, where input coordinates are integers that fit in a machine word. We develop a new algorithm fo...
Timothy M. Chan, Mihai Patrascu
CF
2006
ACM
15 years 9 months ago
Morphogenesis as an amorphous computation
In this paper, we present a programming language viewpoint for morphogenesis, the process of shape formation during embryological development. Specifically, we model morphogenesi...
Arnab Bhattacharyya
137
Voted
AIIDE
2007
15 years 6 months ago
Motivational Ambient and Latent Behaviors in Computer RPGs
Character behaviors in computer role-playing games have a significant impact on game-play, but are often difficult for game authors to implement and adapt. We present a behavior m...
Maria Cutumisu, Duane Szafron, Jonathan Schaeffer,...