Sciweavers

442 search results - page 31 / 89
» Exploration in computer games - a new starting point
Sort
View
PERCOM
2008
ACM
15 years 11 months ago
A Novel Utility and Game-Theoretic Based Security Mechanism for Mobile P2P Systems
Research on security in Peer-to-Peer (P2P) systems is dominated by reputation-based solutions. These solutions propagate opinions about other peers in order to help identify the b...
Brent Lagesse, Mohan Kumar
CASC
2006
Springer
128views Mathematics» more  CASC 2006»
15 years 3 months ago
New Domains for Applied Quantifier Elimination
We address various aspects of our computer algebra-based computer logic system redlog. There are numerous examples in the literature for successful applications of redlog to practi...
Thomas Sturm
ACMACE
2007
ACM
15 years 1 months ago
Transmedial interactions and digital games
As virtual worlds and games grow in both personal and cultural importance, present limitations in access to them is increasingly limiting their ability to achieve their potential....
Shaowen Bardzell, Vicky Wu, Jeffrey Bardzell, Nick...
VLDB
2007
ACM
164views Database» more  VLDB 2007»
16 years 1 days ago
A new intrusion detection system using support vector machines and hierarchical clustering
Whenever an intrusion occurs, the security and value of a computer system is compromised. Network-based attacks make it difficult for legitimate users to access various network ser...
Latifur Khan, Mamoun Awad, Bhavani M. Thuraisingha...
AMC
2008
86views more  AMC 2008»
14 years 12 months ago
Numerical solution of stochastic Nash games with state-dependent noise for weakly coupled large-scale systems
This paper discusses the infinite horizon stochastic Nash games with state-dependent noise. After establishing the asymptotic structure along with the positive semidefiniteness for...
Muneomi Sagara, Hiroaki Mukaidani, Toru Yamamoto