• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 6 of 6

Overtaking Opponents with Blocking Strategies Using Fuzzy Logic

by Enrique Onieva, Luigi Cardamone, Daniele Loiacono, Pier Luca, Lanzi Member Ieee
"... Abstract — In car racing, blocking refers to maneuvers that can prevent, disturb or possibly block an overtaking action by an incoming car. In this paper, we present an advanced overtaking behavior that is able to deal with opponents implementing advanced blocking strategies. The behavior we develop ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
Abstract — In car racing, blocking refers to maneuvers that can prevent, disturb or possibly block an overtaking action by an incoming car. In this paper, we present an advanced overtaking behavior that is able to deal with opponents implementing advanced blocking strategies. The behavior we

22.10.2009 Implementation of a Peer-to-Peer Multiplayer Game with Realtime Requirements

by Gutachten Alej, Ro Buchmann
"... Massively multiplayer online games (MMOGs) have become increasingly popular in the recent years, particularly in the form of online role-playing games (MMORPGs). These games support up to several ten thousand players interacting in a virtual game world. The current commercially successful games are ..."
Abstract - Add to MetaCart
for the network implementation, thus the game is the first real application using CUSP. Finally the game Planet π4 is integrated with the CUSP network simulator, allowing to run the whole game in a simulated network without the need for modification of its core components. Kurzfassung Massen

Name:

by Vorgelegt Am Januar, Oliver Schneider, Fachbereich Informatik, Oliver Schneider Contents
"... ..."
Abstract - Add to MetaCart
Abstract not found

Secure Geographic Routing in Wireless Sensor Networks

by unknown authors , 2013
"... the non-exclusive right to publish the Work electronically and in a non-commercial purpose make it accessible on the Internet. The Author warrants that he/she is the author to the Work, and warrants that the Work does not contain text, pictures or other material that violates copyright law. The Auth ..."
Abstract - Add to MetaCart
the non-exclusive right to publish the Work electronically and in a non-commercial purpose make it accessible on the Internet. The Author warrants that he/she is the author to the Work, and warrants that the Work does not contain text, pictures or other material that violates copyright law

L THE PRODUCTION OF PSYCHOLOGICAL KNOWLEDGE AS COMMUNICATIVE INTERACTION

by unknown authors
"... ..."
Abstract - Add to MetaCart
Abstract not found

Before the Attack: A Typology of Strategies for Competitive Aggressiveness

by Jeffrey E Stambaugh , Andy Yu , Alan J Dubinsky
"... We argue that a firm's competitive actions should flow from a strategy. Yet, the issue of strategy has seemingly been ignored in the competitive dynamics literature. To address that gap, we distinguish between the logics of innovativeness and competitive aggressiveness and build the foundation ..."
Abstract - Add to MetaCart
the foundation for a competitive strategy by outlining the economic mechanisms of competitive action that lead to superior performance. Drawing on the resourced-based view of the firm we develop three resource-based attacks that may be used by competitively aggressive firms. Using this foundation, we derive a
Results 1 - 6 of 6
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University