Sciweavers

2610 search results - page 287 / 522
» codes 2007
Sort
View
MODELS
2007
Springer
15 years 11 months ago
Model-Based Design of Computer-Controlled Game Character Behavior
Recently, the complexity of modern, real-time computer games has increased drastically. The need for sophisticated game AI, in particular for Non-Player Characters, grows with the ...
Jörg Kienzle, Alexandre Denault, Hans Vanghel...
FOAL
2007
ACM
15 years 9 months ago
On bytecode slicing and aspectJ interferences
AspectJ aims at managing tangled concerns in Java systems. Crosscutting aspect definitions are woven into the Java bytecode at compile-time. Whether the better modularization intr...
Antonio Castaldo D'Ursi, Luca Cavallaro, Mattia Mo...
IWMM
2007
Springer
130views Hardware» more  IWMM 2007»
15 years 11 months ago
Accordion arrays
In this work, we present accordion arrays, a straightforward and effective memory compression technique targeting Unicode-based character arrays. In many non-numeric Java programs...
Craig B. Zilles
161
Voted
DRM
2007
Springer
15 years 11 months ago
Mechanism for software tamper resistance: an application of white-box cryptography
In software protection we typically have to deal with the white-box attack model. In this model an attacker is assumed to have full access to the software and full control over it...
Wil Michiels, Paul Gorissen
CSREASAM
2006
15 years 6 months ago
Flexible Cryptographic Component Design for Secure Web Applications
- Although Internet serves many contents and services, it has serious problems of security: the invasion of privacy, hacking and etc. To prevent these problems, two implementations...
Tae Ho Kim, Jong Jin Kim, Chang Hoon Kim, Chun Pyo...