Sciweavers

7504 search results - page 1359 / 1501
» Computing with Action Potentials
Sort
View
SAC
2005
ACM
15 years 9 months ago
Towards the prioritization of regression test suites with data flow information
Regression test prioritization techniques re-order the execution of a test suite in an attempt to ensure that defects are revealed earlier in the test execution phase. In prior wo...
Matthew J. Rummel, Gregory M. Kapfhammer, Andrew T...
123
Voted
STORAGESS
2005
ACM
15 years 9 months ago
An electric fence for kernel buffers
Improper access of data buffers is one of the most common errors in programs written in assembler, C, C++, and several other languages. Existing programs and OSs frequently acces...
Nikolai Joukov, Aditya Kashyap, Gopalan Sivathanu,...
118
Voted
DIGRA
2005
Springer
15 years 9 months ago
Liberal Sims?: Simulated Difference and the Commodity of Social Diversity
This paper outlines how representations of gender, sexuality, race and ethnicity intersect with strategies of late capitalism in The Sims, arguably the most popular video game of ...
A. Brady Curlew
156
Voted
DIGRA
2005
Springer
15 years 9 months ago
Designing Goals for Online Role-Players
The increasing popularity of persistent worlds and the predicted rise of pervasive gaming, both having a strong inherent potential for role-playing, stress a classical challenge o...
Markus Montola
129
Voted
EUC
2005
Springer
15 years 9 months ago
Context-Aware Ubiquitous Data Mining Based Agent Model for Intersection Safety
In USA, 2002, approximately 3.2 million intersection-related crashes occurred, corresponding to 50 percent of all reported crashes. In Japan, more than 58 percent of all traffic cr...
Flora Dilys Salim, Shonali Krishnaswamy, Seng Wai ...
« Prev « First page 1359 / 1501 Last » Next »