Sciweavers

448 search results - page 38 / 90
» Active Matching
Sort
View
NIPS
1997
13 years 9 months ago
Intrusion Detection with Neural Networks
With the rapid expansion of computer networks during the past few years, security has become a crucial issue for modern computer systems. A good way to detect illegitimate use is ...
Jake Ryan, Meng-Jang Lin, Risto Miikkulainen
MANSCI
2006
58views more  MANSCI 2006»
13 years 7 months ago
Venture Capitalists and Cooperative Start-up Commercialization Strategy
I examine the possible impact of venture capital (VC) backing on the commercialization direction of technology-based start-ups by asking: to what extent (if at all) do VC-backed s...
David H. Hsu
SCS
2004
13 years 9 months ago
Contract-Based Justification for COTS Component within Safety Critical Applications
Commercial-Off-The-Shelf (COTS) software components are being used within complex safety-critical applications. However, to use them with confidence, it is necessary to ensure tha...
Fan Ye, Tim Kelly
COOPIS
2003
IEEE
14 years 1 months ago
Profiling and Matchmaking Strategies in Support of Opportunistic Collaboration
With the recent advances in communications technologies and decentralization of work practices, there has been an increase in distributed, remote, computerized work environments. I...
Adriana Santarosa Vivacqua, Melfry Moreno, Jano Mo...
ICPR
2008
IEEE
14 years 9 months ago
Near real-time stereo based on effective cost aggregation
Recent research activity on stereo matching has proved the efficacy of local approaches based on advanced cost aggregation strategies in accurately retrieving 3D information. Howe...
Federico Tombari, Stefano Mattoccia, Luigi di Stef...