Sciweavers

1190 search results - page 122 / 238
» Scalable Active Matching
Sort
View
107
Voted
IWPC
2002
IEEE
15 years 7 months ago
Mining System-User Interaction Traces for Use Case Models
While code understanding is the primary program comprehension activity, it is quite challenging to recognize the application requirements from code, since they have usually been o...
Mohammad El-Ramly, Eleni Stroulia, Paul G. Sorenso...
MIDDLEWARE
2001
Springer
15 years 7 months ago
Thread Transparency in Information Flow Middleware
Abstract. Existing middleware is based on control-flow centric interaction models such as remote method invocations, poorly matching the structure of applications that process con...
Rainer Koster, Andrew P. Black, Jie Huang, Jonatha...
ECAIW
2000
Springer
15 years 7 months ago
A Hierarchy of Reactive Behaviors Handles Complexity
This paper discusses the hierarchical control architecture used to generate the behavior of individual agents and a team of robots for the RoboCup Small Size competition. Our react...
Sven Behnke, Raúl Rojas
124
Voted
NIPS
1997
15 years 4 months ago
Intrusion Detection with Neural Networks
With the rapid expansion of computer networks during the past few years, security has become a crucial issue for modern computer systems. A good way to detect illegitimate use is ...
Jake Ryan, Meng-Jang Lin, Risto Miikkulainen
MANSCI
2006
58views more  MANSCI 2006»
15 years 2 months ago
Venture Capitalists and Cooperative Start-up Commercialization Strategy
I examine the possible impact of venture capital (VC) backing on the commercialization direction of technology-based start-ups by asking: to what extent (if at all) do VC-backed s...
David H. Hsu