Sciweavers

442 search results - page 11 / 89
» Exploration in computer games - a new starting point
Sort
View
BC
2005
127views more  BC 2005»
14 years 9 months ago
Computational modeling and exploration of contour integration for visual saliency
Abstract Weproposeacomputationalmodelofcontourintegration for visual saliency. The model uses biologically plausible devices to simulate how the representations of elements aligned...
T. Nathan Mundhenk, Laurent Itti
ICC
2007
IEEE
111views Communications» more  ICC 2007»
15 years 3 months ago
SecureRank: A Risk-Based Vulnerability Management Scheme for Computing Infrastructures
— In this paper, we introduce a new scheme called SecureRank for prioritizing vulnerabilities to patch in computing systems/networks. This has become a key issue for IT infrastru...
Reiko Ann Miura-Ko, Nicholas Bambos
DIGRA
2005
Springer
15 years 3 months ago
B.Sc. Computer Game Development ... Why not?
We were motivated to consider proposing/adopting a new curriculum by the decrease in student enrolments currently experienced by our computing science programs. This requirement f...
Libero Ficocelli, David Gregg
IFIP
2001
Springer
15 years 1 months ago
Better Safe than Sorry? In Search of an Internet Business Model in Online Entertainment
This paper presents an action case study of the process by which the Swedish computer game developer Daydream Software planned, developed, and implemented the business model for i...
Ola Henfridsson, Helena Holmström, Ole Hanset...
DSD
2003
IEEE
97views Hardware» more  DSD 2003»
15 years 2 months ago
A Quadruple Precision and Dual Double Precision Floating-Point Multiplier
Double precision floating-point arithmetic is inadequate for many scientific computations. This paper presents the design of a quadruple precision floating-point multiplier tha...
Ahmet Akkas, Michael J. Schulte