Sciweavers

27 search results - page 5 / 6
» Fighting Censorship with Algorithms
Sort
View
ATAL
2008
Springer
15 years 1 months ago
Demonstration of multi-agent potential fields in real-time strategy games
Bots for Real Time Strategy (RTS) games provide a rich challenge to implement. A bot controls a number of units that may have to navigate in a partially unknown environment, while...
Johan Hagelbäck, Stefan J. Johansson
JVCA
2007
132views more  JVCA 2007»
14 years 11 months ago
Interactive and flexible motion transition
In this paper, we present an example-based motion synthesis technique. Users can interactively control the virtual character to perform desired actions in any order. The desired a...
Jen-Yu Peng, I-Chen Lin, Jui-Hsiang Chao, Yan-Ju C...
CORR
2008
Springer
98views Education» more  CORR 2008»
14 years 11 months ago
An Information-Theoretical View of Network-Aware Malware Attacks
This work investigates three aspects: (a) a network vulnerability as the non-uniform vulnerable-host distribution, (b) threats, i.e., intelligent malwares that exploit such a vulne...
Zesheng Chen, Chuanyi Ji
KDD
2006
ACM
381views Data Mining» more  KDD 2006»
15 years 12 months ago
GPLAG: detection of software plagiarism by program dependence graph analysis
Along with the blossom of open source projects comes the convenience for software plagiarism. A company, if less self-disciplined, may be tempted to plagiarize some open source pr...
Chao Liu 0001, Chen Chen, Jiawei Han, Philip S. Yu
ATAL
2008
Springer
15 years 1 months ago
Using multi-agent potential fields in real-time strategy games
Bots for Real Time Strategy (RTS) games provide a rich challenge to implement. A bot controls a number of units that may have to navigate in a partially unknown environment, while...
Johan Hagelbäck, Stefan J. Johansson