Sciweavers

3872 search results - page 588 / 775
» The Java memory model
Sort
View
AGS
2009
Springer
15 years 9 months ago
Intelligent NPCs for Educational Role Play Game
Video games in general and educational role play games in particular would increase in believability if Non Player Characters reacted appropriately to the player’s actions. Reali...
Mei Yii Lim, João Dias, Ruth Aylett, Ana Pa...
WDAG
2009
Springer
77views Algorithms» more  WDAG 2009»
15 years 9 months ago
Nonblocking Algorithms and Backward Simulation
Abstract. Optimistic and nonblocking concurrent algorithms are increasingly finding their way into practical use; an important example is software transactional memory implementat...
Simon Doherty, Mark Moir
115
Voted
AINA
2008
IEEE
15 years 9 months ago
Thread Allocation in Chip Multiprocessor Based Multithreaded Network Processors
—This work tries to derive ideas for thread allocation in Chip Multiprocessor (CMP)-based network processors performing general applications by Continuous-Time Markov Chain model...
Yi-Neng Lin, Ying-Dar Lin, Yuan-Cheng Lai
CNSR
2008
IEEE
214views Communications» more  CNSR 2008»
15 years 8 months ago
HGKM: A Group-Based Key Management Scheme for Sensor Networks Using Deployment Knowledge
Key establishment plays a central role in authentication and encryption in wireless sensor networks, especially when they are mainly deployed in hostile environments. Because of t...
Ngo Trong Canh, Young-Koo Lee, Sungyoung Lee
GLOBECOM
2008
IEEE
15 years 8 months ago
Guaranteed Boxed Localization in MANETs by Interval Analysis and Constraints Propagation Techniques
Abstract—In this contribution, we propose an original algorithm for self-localization in mobile ad-hoc networks. The proposed technique, based on interval analysis, is suited to ...
Farah Mourad, Hichem Snoussi, Fahed Abdallah, C&ea...