Sciweavers

861 search results - page 84 / 173
» Predicting Attack-prone Components
Sort
View
IJRR
2010
144views more  IJRR 2010»
15 years 27 days ago
Equilibrium Conformations of Concentric-tube Continuum Robots
Robots consisting of several concentric, preshaped, elastic tubes can work dexterously in narrow, constrained, and/or winding spaces, as are commonly found in minimally invasive s...
D. Caleb Rucker, Robert J. Webster III, Gregory S....
AISS
2010
125views more  AISS 2010»
14 years 12 months ago
A Dual-Mode Intelligent Shopping Assistant
"Radio Frequency Identification" (RFID) promises to enable an automatic collection of shopping data for business intelligent purposes. Three important components of inte...
Lilac A. E. Al-Safadi
SAMOS
2004
Springer
15 years 7 months ago
Scalable Instruction-Level Parallelism.
This paper presents a model for instruction-level distributed computing that allows the implementation of scalable chip multiprocessors. Based on explicit microthreading it serves ...
Chris R. Jesshope
BMCBI
2004
88views more  BMCBI 2004»
15 years 2 months ago
Coronavirus 3CLpro proteinase cleavage sites: Possible relevance to SARS virus pathology
Background: Despite the passing of more than a year since the first outbreak of Severe Acute Respiratory Syndrome (SARS), efficient counter-measures are still few and many believe...
Lars Kiemer, Ole Lund, Søren Brunak, Nikola...
142
Voted
TON
2010
161views more  TON 2010»
14 years 9 months ago
Investigating Self-Similarity and Heavy-Tailed Distributions on a Large-Scale Experimental Facility
Abstract--After the seminal work by Taqqu et al. relating selfsimilarity to heavy-tailed distributions, a number of research articles verified that aggregated Internet traffic time...
Patrick Loiseau, Paulo Gonçalves, Guillaume...