نتایج جستجو برای: heist

تعداد نتایج: 52  

2012
Ruben Stranders Long Tran-Thanh Francesco Maria Delle Fave Alex Rogers Nicholas R. Jennings

Real life coordination problems are characterised by stochasticity and a lack of a priori knowledge about the interactions between agents. However, decentralised constraint optimisation problems (DCOPs), a widely adopted framework for modelling decentralised coordination tasks, assumes perfect knowledge of these factors, thus limiting its practical applicability. To address this shortcoming, we...

2016
Mathy Vanhoef Tom Van Goethem

Over the last few years, a worryingly number of attacks against SSL/TLS and other secure channels have been discovered. Fortunately, at least from a defenders perspective, these attacks require an adversary capable of observing or manipulating network traffic. This prevented a wide and easy exploitation of these vulnerabilities. In contrast, we introduce HEIST, a set of techniques that allows u...

Journal: :Cell Host & Microbe 2009

Journal: :NECSUS. European Journal of Media Studies 2015

Journal: :Computer Animation and Virtual Worlds 2023

Non-playable characters (NPCs) play a crucial role in enhancing immersion video games. However, traditional NPC behaviors are often hard-coded using methods such as Finite State Machines, Decision and Behavior trees. This has few limitations; namely, it is quite difficult to implement complex cooperative secondly this makes easy for human players identify exploit patterns behavior. To overcome ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید