Sciweavers

1466 search results - page 234 / 294
» Completeness of the Authentication Tests
Sort
View
JOCN
2010
60views more  JOCN 2010»
13 years 6 months ago
Responding with Restraint: What Are the Neurocognitive Mechanisms?
■ An important aspect of cognitive control is the ability to respond with restraint. Here, we modeled this experimentally by measuring the degree of response slowing that occurs...
Sara Jahfari, Cathy M. Stinear, Mike Claffey, Fred...
MICCAI
2010
Springer
13 years 6 months ago
Micro-force Sensing in Robot Assisted Membrane Peeling for Vitreoretinal Surgery
Abstract. Vitreoretinal surgeons use 0.5mm diameter instruments to manipulate delicate tissue inside the eye while applying imperceptible forces that can cause damage to the retina...
Marcin Balicki, Ali Uneri, Iulian Iordachita, Jame...
MP
2010
135views more  MP 2010»
13 years 6 months ago
An inexact Newton method for nonconvex equality constrained optimization
Abstract We present a matrix-free line search algorithm for large-scale equality constrained optimization that allows for inexact step computations. For sufficiently convex problem...
Richard H. Byrd, Frank E. Curtis, Jorge Nocedal
RAS
2010
104views more  RAS 2010»
13 years 6 months ago
A hybrid controller based on the egocentric perceptual principle
In this paper we extend the control methodology based on Extended Markov Tracking (EMT) by providing the control algorithm with capabilities to calibrate and even partially recons...
Zinovi Rabinovich, Nicholas R. Jennings
RV
2010
Springer
122views Hardware» more  RV 2010»
13 years 6 months ago
Clara: A Framework for Partially Evaluating Finite-State Runtime Monitors Ahead of Time
Researchers have developed a number of runtime verification tools that generate runtime monitors in the form of AspectJ aspects. In this work, we present Clara, a novel framework ...
Eric Bodden, Patrick Lam, Laurie J. Hendren