Sciweavers

1998 search results - page 397 / 400
» Situated Control Rules
Sort
View
123
Voted
ENTCS
2007
168views more  ENTCS 2007»
14 years 11 months ago
Bytecode Rewriting in Tom
In this paper, we present a term rewriting based library for manipulating Java bytecode. We define a mapping from bytecode programs to algebraic terms, and we use Tom, an extensi...
Emilie Balland, Pierre-Etienne Moreau, Antoine Rei...
116
Voted
TC
2008
14 years 11 months ago
DRES: Dynamic Range Encoding Scheme for TCAM Coprocessors
One of the most critical resource management issues in the use of ternary content addressable memory (TCAM) for packet classification/filtering is how to effectively support filte...
Hao Che, Zhijun Wang, Kai Zheng, Bin Liu
TWC
2008
120views more  TWC 2008»
14 years 11 months ago
A cartel maintenance framework to enforce cooperation in wireless networks with selfish users
Abstract-- In distributed wireless networks without centralized control, each user is its own authority to maximize its own performance. This distributed characteristic provides th...
Zhu Han, Zhu Ji, K. J. Ray Liu
107
Voted
AAI
2002
161views more  AAI 2002»
14 years 11 months ago
Scripting Affective Communication with Life-Like Characters in Web-Based Interaction Systems
In this paper, we discuss scripting tools that aim at facilitating the design of web-based interactions with animated characters capable of affective communication. Specifically, ...
Helmut Prendinger, Sylvain Descamps, Mitsuru Ishiz...
113
Voted
BMCBI
2004
121views more  BMCBI 2004»
14 years 11 months ago
DEDB: a database of Drosophila melanogaster exons in splicing graph form
Background: A wealth of quality genomic and mRNA/EST sequences in recent years has provided the data required for large-scale genome-wide analysis of alternative splicing. We have...
Bernett T. K. Lee, Tin Wee Tan, Shoba Ranganathan