Sciweavers

4190 search results - page 707 / 838
» Implementing commitment-based interactions
Sort
View
124
Voted
RC
2002
100views more  RC 2002»
15 years 2 months ago
Efficient Interval Linear Equality Solving in Constraint Logic Programming
Existing interval constraint logic programming languages, such as BNR Prolog, work under the framework of interval narrowing and are deficient in solving systems of linear constrai...
Chong-Kan Chiu, Jimmy Ho-Man Lee
SIGCSE
2002
ACM
126views Education» more  SIGCSE 2002»
15 years 2 months ago
Design patterns for games
Designing a two-person game involves identifying the game model to compute the best moves, the user interface (the "view") to play the game, and the controller to coordi...
Dung Zung Nguyen, Stephen B. Wong
127
Voted
TEC
2002
166views more  TEC 2002»
15 years 2 months ago
An artificial immune system architecture for computer security applications
With increased global interconnectivity, reliance on e-commerce, network services, and Internet communication, computer security has become a necessity. Organizations must protect ...
Paul K. Harmer, Paul D. Williams, Gregg H. Gunsch,...
119
Voted
TOG
2002
154views more  TOG 2002»
15 years 2 months ago
Image based flow visualization
A new method for the visualization of two-dimensional fluid flow is presented. The method is based on the advection and decay of dye. These processes are simulated by defining eac...
Jarke J. van Wijk
VLDB
2002
ACM
99views Database» more  VLDB 2002»
15 years 2 months ago
An Efficient Method for Performing Record Deletions and Updates Using Index Scans
We present a method for efficiently performing deletions and updates of records when the records to be deleted or updated are chosen by a range scan on an index. The traditional m...
C. Mohan