Sciweavers

1190 search results - page 122 / 238
» Scalable Active Matching
Sort
View
IWPC
2002
IEEE
14 years 27 days ago
Mining System-User Interaction Traces for Use Case Models
While code understanding is the primary program comprehension activity, it is quite challenging to recognize the application requirements from code, since they have usually been o...
Mohammad El-Ramly, Eleni Stroulia, Paul G. Sorenso...
MIDDLEWARE
2001
Springer
14 years 13 days ago
Thread Transparency in Information Flow Middleware
Abstract. Existing middleware is based on control-flow centric interaction models such as remote method invocations, poorly matching the structure of applications that process con...
Rainer Koster, Andrew P. Black, Jie Huang, Jonatha...
ECAIW
2000
Springer
14 years 10 days ago
A Hierarchy of Reactive Behaviors Handles Complexity
This paper discusses the hierarchical control architecture used to generate the behavior of individual agents and a team of robots for the RoboCup Small Size competition. Our react...
Sven Behnke, Raúl Rojas
NIPS
1997
13 years 9 months ago
Intrusion Detection with Neural Networks
With the rapid expansion of computer networks during the past few years, security has become a crucial issue for modern computer systems. A good way to detect illegitimate use is ...
Jake Ryan, Meng-Jang Lin, Risto Miikkulainen
MANSCI
2006
58views more  MANSCI 2006»
13 years 8 months ago
Venture Capitalists and Cooperative Start-up Commercialization Strategy
I examine the possible impact of venture capital (VC) backing on the commercialization direction of technology-based start-ups by asking: to what extent (if at all) do VC-backed s...
David H. Hsu