Sciweavers

931 search results - page 145 / 187
» Controlled Experimentation with Agents - Models and Implemen...
Sort
View
DAGM
2003
Springer
15 years 5 months ago
Learning Human-Like Opponent Behavior for Interactive Computer Games
Compared to their ancestors in the early 1970s, present day computer games are of incredible complexity and show magnificent graphical performance. However, in programming intelli...
Christian Bauckhage, Christian Thurau, Gerhard Sag...
CONEXT
2009
ACM
15 years 27 days ago
Detecting network neutrality violations with causal inference
We present NANO, a system that detects when ISPs apply policies that discriminate against specific classes of applications, users, or destinations. Existing systems for detecting ...
Muhammad Mukarram Bin Tariq, Murtaza Motiwala, Nic...
OOPSLA
2009
Springer
15 years 6 months ago
Debug all your code: portable mixed-environment debugging
Programmers build large-scale systems with multiple languages to reuse legacy code and leverage languages best suited to their problems. For instance, the same program may use Jav...
Byeongcheol Lee, Martin Hirzel, Robert Grimm, Kath...
TRUST
2009
Springer
15 years 6 months ago
Secure VPNs for Trusted Computing Environments
Abstract. Virtual Private Networks are a popular mechanism for building complex network infrastructures. Such infrastructures are usually accompanied by strict administrative restr...
Steffen Schulz, Ahmad-Reza Sadeghi
SMC
2007
IEEE
102views Control Systems» more  SMC 2007»
15 years 6 months ago
TagFree: Identifying users without tags in smart home environments
— Since family members have their unique features when living in a smart home environment, user identifications are able to achieve without any tags. In this paper, we propose T...
Wen-Chih Peng, Wangling Huang, YiLing Chen, PeiChi...