Sciweavers

1377 search results - page 235 / 276
» Neural Computing
Sort
View
ACSAC
1998
IEEE
13 years 12 months ago
Detecting Anomalous and Unknown Intrusions Against Programs
The ubiquity of the Internet connection to desktops has been both boon to business as well as cause for concern for the security of digital assets that may be unknowingly exposed....
Anup K. Gosh, James Wanken, Frank Charron
HICSS
1998
IEEE
176views Biometrics» more  HICSS 1998»
13 years 12 months ago
Intelligent System for Reading Handwriting on Forms
The National Institute of Standards and Technology (NIST) has developed a form-based handprint recognition system for reading information written on forms. This public domain soft...
Michael D. Garris
DAGM
1997
Springer
13 years 12 months ago
A Feature Map Approach to Real-Time 3-D Object Pose Estimation from Single 2-D Perspective Views
A novel approach to the computation of an approximate estimate of spatial object pose from camera images is proposed. The method is based on a neural network that generates pose hy...
S. Winkler, Patrick Wunsch, Gerd Hirzinger
ICCS
1994
Springer
13 years 11 months ago
UDS: A Universal Data Structure
This paper gives a data structure (UDS) for supporting database retrieval, inference and machine learning that attempts to unify and extend previous work in relational databases, ...
Robert Levinson
DCOSS
2006
Springer
13 years 11 months ago
Evaluating Local Contributions to Global Performance in Wireless Sensor and Actuator Networks
Wireless sensor networks are often studied with the goal of removing information from the network as efficiently as possible. However, when the application also includes an actuato...
Christopher J. Rozell, Don H. Johnson