Bone dissection is an important component of many surgical procedures. In this paper, we discuss adaptive techniques for providing real-time haptic and visual feedback during a vi...
Marco Agus, Andrea Giachetti, Enrico Gobbetti, Gia...
Ad hoc networks are exposed more than traditional networks to security threats due to their mobility and open architecture aspects. In addition, any dysfunction due to badly congu...
This paper proposes the use of empirical modeling techniques for building microarchitecture sensitive models for compiler optimizations. The models we build relate program perform...
Kapil Vaswani, Matthew J. Thazhuthaveetil, Y. N. S...
How can artificial neural nets generalize better from fewer examples? In order to generalize successfully, neural network learning methods typically require large training data se...
Abstract. Several generic constructions for transforming one-way functions to asymmetric encryption schemes have been proposed. One-way functions only guarantee the weak secrecy of...