Sciweavers

7839 search results - page 1477 / 1568
» What's there and what's not
Sort
View
CL
2010
Springer
15 years 28 days ago
Isolating untrusted software extensions by custom scoping rules
In a modern programming language, scoping rules determine the visibility of names in various regions of a program [15]. In this work, we examine the idea of allowing an applicatio...
Philip W. L. Fong, Simon A. Orr
CE
2008
156views more  CE 2008»
15 years 28 days ago
Interactive story authoring: A viable form of creative expression for the classroom
The unprecedented growth in numbers of children playing computer games has stimulated discussion and research regarding what, if any, educational value these games have for teachi...
Mike Carbonaro, Maria Cutumisu, Harvey Duff, Steph...
97
Voted
CGF
2008
100views more  CGF 2008»
15 years 27 days ago
Density Displays for Data Stream Monitoring
In many business applications, large data workloads such as sales figures or process performance measures need to be monitored in real-time. The data analysts want to catch proble...
Ming C. Hao, Daniel A. Keim, Umeshwar Dayal, Danie...
CN
2008
128views more  CN 2008»
15 years 27 days ago
Autonomous security for autonomous systems
The Internet's interdomain routing protocol, BGP, supports a complex network of Autonomous Systems which is vulnerable to a number of potentially crippling attacks. Several p...
Josh Karlin, Stephanie Forrest, Jennifer Rexford
111
Voted
CORR
2010
Springer
152views Education» more  CORR 2010»
15 years 27 days ago
Neuroevolutionary optimization
Temporal difference methods are theoretically grounded and empirically effective methods for addressing reinforcement learning problems. In most real-world reinforcement learning ...
Eva Volná
« Prev « First page 1477 / 1568 Last » Next »