Sciweavers

7296 search results - page 1425 / 1460
» informs 2010
Sort
View
MMS
2010
14 years 8 months ago
Gaming on the move: urban experience as a new paradigm for mobile pervasive game design
In this paper, we describe a pervasive treasure hunting game: “Team exploration” based on the Transhumance ad hoc wifi platform. The testers of this game came up with innovati...
Annie Gentes, Aude Guyot-Mbodji, Isabelle M. Demeu...
MSOM
2010
84views more  MSOM 2010»
14 years 8 months ago
Project Management Contracts with Delayed Payments
In project management, most manufacturers (project managers) offer no delayed payment contracts under which each supplier (contractor) will receive a pre-specified payment when ...
H. Dharma Kwon, Steven A. Lippman, Kevin F. McCard...
NECO
2010
103views more  NECO 2010»
14 years 8 months ago
Posterior Weighted Reinforcement Learning with State Uncertainty
Reinforcement learning models generally assume that a stimulus is presented that allows a learner to unambiguously identify the state of nature, and the reward received is drawn f...
Tobias Larsen, David S. Leslie, Edmund J. Collins,...
OOPSLA
2010
Springer
14 years 8 months ago
Ownership and immutability in generic Java
The Java language lacks the important notions of ownership (an object owns its representation to prevent unwanted aliasing) and immutability (the division into mutable, immutable,...
Yoav Zibin, Alex Potanin, Paley Li, Mahmood Ali, M...
P2P
2010
IEEE
132views Communications» more  P2P 2010»
14 years 8 months ago
Towards Plugging Privacy Leaks in the Domain Name System
—Privacy leaks are an unfortunate and an integral part of the current Internet domain name resolution. Each DNS query generated by a user reveals – to one or more DNS servers ...
Yanbin Lu, Gene Tsudik
« Prev « First page 1425 / 1460 Last » Next »