Sciweavers

2747 search results - page 477 / 550
» Non-oblivious Strategy Improvement
Sort
View
CHI
2007
ACM
15 years 2 months ago
Longitudinal study of continuous non-speech operated mouse pointer
This paper reports a longitudinal study of a non-speech input-controlled continuous cursor control system: Whistling User Interface (U3I). This study combines quantitative (target...
Adam J. Sporka, Sri Hastuti Kurniawan, Murni Mahmu...
DASFAA
2007
IEEE
148views Database» more  DASFAA 2007»
15 years 2 months ago
Schema Mapping in P2P Networks Based on Classification and Probing
In this paper, we address the problems of adaptive schema mappings between different peers in peer-to-peer network and searching for interesting data residing at different peers ba...
Guoliang Li, Beng Chin Ooi, Bei Yu, Lizhu Zhou
ECOOP
2007
Springer
15 years 2 months ago
AS-GC: An Efficient Generational Garbage Collector for Java Application Servers
Abstract. A generational collection strategy utilizing a single nursery cannot efficiently manage objects in application servers due to variance in their lifespans. In this paper, ...
Feng Xian, Witawas Srisa-an, ChengHuan Jia, Hong J...
ICCBR
2010
Springer
15 years 2 months ago
Similarity-Based Retrieval and Solution Re-use Policies in the Game of Texas Hold'em
In previous papers we have presented our autonomous poker playing agent (SARTRE) that uses a memory-based approach to create a betting strategy for two-player, limit Texas Hold’e...
Jonathan Rubin, Ian Watson
ESORICS
2007
Springer
15 years 2 months ago
Efficient Proving for Practical Distributed Access-Control Systems
We present a new technique for generating a formal proof that an access request satisfies accesscontrol policy, for use in logic-based access-control frameworks. Our approach is t...
Lujo Bauer, Scott Garriss, Michael K. Reiter