Sciweavers

861 search results - page 84 / 173
» Predicting Attack-prone Components
Sort
View
IJRR
2010
144views more  IJRR 2010»
13 years 9 months ago
Equilibrium Conformations of Concentric-tube Continuum Robots
Robots consisting of several concentric, preshaped, elastic tubes can work dexterously in narrow, constrained, and/or winding spaces, as are commonly found in minimally invasive s...
D. Caleb Rucker, Robert J. Webster III, Gregory S....
AISS
2010
125views more  AISS 2010»
13 years 8 months ago
A Dual-Mode Intelligent Shopping Assistant
"Radio Frequency Identification" (RFID) promises to enable an automatic collection of shopping data for business intelligent purposes. Three important components of inte...
Lilac A. E. Al-Safadi
SAMOS
2004
Springer
14 years 4 months ago
Scalable Instruction-Level Parallelism.
This paper presents a model for instruction-level distributed computing that allows the implementation of scalable chip multiprocessors. Based on explicit microthreading it serves ...
Chris R. Jesshope
BMCBI
2004
88views more  BMCBI 2004»
13 years 10 months ago
Coronavirus 3CLpro proteinase cleavage sites: Possible relevance to SARS virus pathology
Background: Despite the passing of more than a year since the first outbreak of Severe Acute Respiratory Syndrome (SARS), efficient counter-measures are still few and many believe...
Lars Kiemer, Ole Lund, Søren Brunak, Nikola...
TON
2010
161views more  TON 2010»
13 years 5 months ago
Investigating Self-Similarity and Heavy-Tailed Distributions on a Large-Scale Experimental Facility
Abstract--After the seminal work by Taqqu et al. relating selfsimilarity to heavy-tailed distributions, a number of research articles verified that aggregated Internet traffic time...
Patrick Loiseau, Paulo Gonçalves, Guillaume...