Sciweavers

886 search results - page 80 / 178
» Generalized Bezout Identity
Sort
View
IROS
2006
IEEE
126views Robotics» more  IROS 2006»
14 years 3 months ago
A System for Robotic Heart Surgery that Learns to Tie Knots Using Recurrent Neural Networks
Abstract— Tying suture knots is a time-consuming task performed frequently during Minimally Invasive Surgery (MIS). Automating this task could greatly reduce total surgery time f...
Hermann Georg Mayer, Faustino J. Gomez, Daan Wiers...
ACMICEC
2003
ACM
144views ECommerce» more  ACMICEC 2003»
14 years 2 months ago
Security model for a multi-agent marketplace
A multi-agent marketplace, MAGNET (Multi AGent Negotiation Testbed), is a promising solution to conduct online combinatorial auctions. The trust model of MAGNET is somewhat diffe...
Ashutosh Jaiswal, Yongdae Kim, Maria L. Gini
JHSN
2006
267views more  JHSN 2006»
13 years 9 months ago
Client-side access control enforcement using trusted computing and PEI models
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard ...
Ravi S. Sandhu, Xinwen Zhang, Kumar Ranganathan, M...
JSAC
2007
108views more  JSAC 2007»
13 years 9 months ago
Optimal relay functionality for SNR maximization in memoryless relay networks
We explore the SNR-optimal relay functionality in a memoryless relay network, i.e. a network where, during each channel use, the signal transmitted by a relay depends only on the ...
Krishna Srikanth Gomadam, Syed Ali Jafar
WRLA
2010
13 years 7 months ago
A Maude Coherence Checker Tool for Conditional Order-Sorted Rewrite Theories
For a rewrite theory to be executable, its equations E should be (ground) confluent and terminating modulo the given axioms A, and their rules should be (ground) coherent with E m...
Francisco Durán, José Meseguer