Sciweavers

6274 search results - page 999 / 1255
» Proofs, Programs, Processes
Sort
View
173
Voted
SIGMOD
2007
ACM
153views Database» more  SIGMOD 2007»
16 years 1 months ago
Scaling games to epic proportion
We introduce scalability for computer games as the next frontier for techniques from data management. A very important aspect of computer games is the artificial intelligence (AI)...
Walker M. White, Alan J. Demers, Christoph Koch, J...
113
Voted
EUROSYS
2008
ACM
15 years 10 months ago
Eudaemon: involuntary and on-demand emulation against zero-day exploits
Eudaemon is a technique that aims to blur the borders between protected and unprotected applications, and brings together honeypot technology and end-user intrusion detection and ...
Georgios Portokalidis, Herbert Bos
122
Voted
CCGRID
2009
IEEE
15 years 8 months ago
Natively Supporting True One-Sided Communication in
As high-end computing systems continue to grow in scale, the performance that applications can achieve on such large scale systems depends heavily on their ability to avoid explic...
Gopalakrishnan Santhanaraman, Pavan Balaji, K. Gop...
115
Voted
CEC
2009
IEEE
15 years 8 months ago
What is situated evolution?
—In this paper we discuss the notion of situated evolution. Our treatment includes positioning situated evolution on the map of evolutionary processes in terms of time- and space...
Martijn C. Schut, Evert Haasdijk, A. E. Eiben
103
Voted
WEBI
2009
Springer
15 years 7 months ago
Building Blocks: Layered Components Approach for Accumulating High-Demand Web Services
Abstract—Customization of systems is costly, but it is necessary to better meet the needs of multi-various tasks and requirements in the fields such as medical care, education, ...
Satoshi Morimoto, Satoshi Sakai, Masaki Gotou, Hee...