• Nenhum resultado encontrado

[PDF] Top 20 AN ALGORITHMIC AND SOFTWARE ENGINEERING BASED APPROACH TO ROBUST VIDEO GAME DESIGN

Has 10000 "AN ALGORITHMIC AND SOFTWARE ENGINEERING BASED APPROACH TO ROBUST VIDEO GAME DESIGN" found on our website. Below are the top 20 most common "AN ALGORITHMIC AND SOFTWARE ENGINEERING BASED APPROACH TO ROBUST VIDEO GAME DESIGN".

AN ALGORITHMIC AND SOFTWARE ENGINEERING BASED APPROACH TO ROBUST VIDEO GAME DESIGN

AN ALGORITHMIC AND SOFTWARE ENGINEERING BASED APPROACH TO ROBUST VIDEO GAME DESIGN

... The design and development of a large video game is a challenging software engineering problem and thus a non-trivial ...task. To make the venture successful ... See full document

14

Component-Based Software Engineering: a Quantitative Approach

Component-Based Software Engineering: a Quantitative Approach

... number and kind of defects found with meetingless Fagan inspections [Porter ...lead to the identification of an opportunity to make the code inspections process more effective, considering the ... See full document

400

Roadmap to a DO-178C Formal Model-Based Software Engineering Methodology

Roadmap to a DO-178C Formal Model-Based Software Engineering Methodology

... developers and stakeholders visualize different aspects of the system while avoiding the details of ...of software engineering, namely the abstraction and separation of concern principles ... See full document

6

An Agent Based Software Approach towards Building Complex Systems

An Agent Based Software Approach towards Building Complex Systems

... due to increased product functionalities, softwareprojects have become more and more complex and along withincreasing work completion pressures, the software projects arerequired to be ... See full document

5

Educ. Real.  vol.42 número1

Educ. Real. vol.42 número1

... there to fill/ but/ sometimes we can wait/ to fill after we come back from the recess/ we enter the classroom get the bottle/ go to the drinking fountain/ fill it up/ and let it already full/ ... See full document

25

This is video game play: video games, authority and metacommunication

This is video game play: video games, authority and metacommunication

... play and meta-communication in ruled games seems to allude to a process of impoverishment that the rigidness of rules acts upon the frame of ...within an institu- tional game, the less ... See full document

16

 Simulation Based Studies in Software Engineering: A Matter of Validity

Simulation Based Studies in Software Engineering: A Matter of Validity

... threat to internal validity that is hard to identify: the simulation model simplifications (assumptions) forcing desired outcomes, rather than producing them based on the determination of proper ... See full document

18

Robust Controller Design for an Autonomous Underwater Vehicle

Robust Controller Design for an Autonomous Underwater Vehicle

... started to be studied in the 60s ...(1970 to 2000) advances outside the AUV community greatly affected the AUV development ...guidance and control algorithms implementation on autonomous ...tested ... See full document

114

Graphical user interface redefinition addressing users’ diversity

Graphical user interface redefinition addressing users’ diversity

... the Design Guidelines Provider supports an automatic GUI redefini- tion at ...machine and only the new GUI is presented to the ...the approach made by Silva et al. [14] to enable ... See full document

9

J. Microw. Optoelectron. Electromagn. Appl.  vol.14 número2

J. Microw. Optoelectron. Electromagn. Appl. vol.14 número2

... order to validate these results, the beam propagation method in frequency domain [23] has been used to simulate the propagation of the fundamental mode along this ...7 and 8. It can be observed that ... See full document

9

Triple Modular Redundancy verification via heuristic netlist analysis

Triple Modular Redundancy verification via heuristic netlist analysis

... calculated based on measurements on smaller tests, using a testbench with 200,000 clock cycles and injecting in every possible FF, assuming a faster-than-real 5 ms runtime for each ...Research, and ... See full document

17

Laboratory investigation of the effect of a new labyrinth with different length and width in the wing length of a triangular-shaped labyrinth weir

Laboratory investigation of the effect of a new labyrinth with different length and width in the wing length of a triangular-shaped labyrinth weir

... structures to control water levels in the irrigation ...is an effective and economical approach to improve the efficiency of the weir by increasing its effective crest ...height ... See full document

5

UI Design and Implementation of video Indexing Based on Timeframes

UI Design and Implementation of video Indexing Based on Timeframes

... data; and 3) Very little prior ...indexing and retrieval of videos quite difficult. In the past, video databases have been relatively small, and Indexing and retrieval have been ... See full document

3

DESIGN OF ROBUST COMMAND TO LINE-OF-SIGHT GUIDANCE LAW: A FUZZY ADAPTIVE APPROACH

DESIGN OF ROBUST COMMAND TO LINE-OF-SIGHT GUIDANCE LAW: A FUZZY ADAPTIVE APPROACH

... used to form the suitable commands for missile control ...missile to the ...4] and adaptive and fuzzy sliding mode controllers [5] have been proposed to solve the guidance ...Due ... See full document

14

Designing for an inquiry based approach to  blended and online learning

Designing for an inquiry based approach to blended and online learning

... importance and the role of inquiry in relationship to experiential ...community approach to inquiry-based learning in his book entitled Democracy in Education and Lipman (1991) ... See full document

18

Software Theft Detection Using Birthmark Alg

Software Theft Detection Using Birthmark Alg

... organisation and consider code as a core asset. A birthmark can help them to detect code theft by identifying intrinsic properties of a ...likely to share a common ...difficult to foil because ... See full document

7

A Lean approach to the reengineering of an organization's processes and design

A Lean approach to the reengineering of an organization's processes and design

... company, and Taiichi Ohno, an engineer who worked ...able to increase the flow of products by implementing the first moving assembling line on the shop floor, but he could not diversify the range of ... See full document

90

Iterative reconstruction of transcriptional regulatory networks: an algorithmic approach.

Iterative reconstruction of transcriptional regulatory networks: an algorithmic approach.

... bacterial and 23 archaeal sequenced genomes, and the GOLD database [2] listed 987 ongoing prokaryotic sequencing ...[3] and environmental sequencing [4] efforts is that the number of sequenced ... See full document

10

Practical Analysis of the Properties of Nanoscale Electronic Elements Aimed at their  Application when Designing Parallel Architecture Computing Systems

Practical Analysis of the Properties of Nanoscale Electronic Elements Aimed at their Application when Designing Parallel Architecture Computing Systems

... phenomena and processes in na- noscale electronic elements which carry information in the simulated artificial neural network, determine the fault tolerance parameter of the system in ...due to the fact ... See full document

4

Stern-Judging: A Simple, Successful Norm Which Promotes Cooperation under Indirect Reciprocity

Stern-Judging: A Simple, Successful Norm Which Promotes Cooperation under Indirect Reciprocity

... strong and selfish individuals are the ones who benefit most from natural ...Trivers, and Wilson [2–4], an act is altruistic if it confers a benefit b to another individual in spite of accruing a ... See full document

5

Show all 10000 documents...