Sciweavers

373 search results - page 47 / 75
» Virtual Power Limiter System which Guarantees Stability of C...
Sort
View
ICRA
2008
IEEE
160views Robotics» more  ICRA 2008»
14 years 1 months ago
A constrained optimization approach to virtual fixtures for multi-handed tasks
— In this work, we have extended the concept of constrained motion control of robots to surgical tasks that require multiple robots. We present virtual fixtures to guide the mot...
Ankur Kapoor, Russell H. Taylor
QOFIS
2001
Springer
13 years 11 months ago
Constrained TCP-Friendly Congestion Control for Multimedia Communication
With the lack of admission control and resource reservation mechanisms in the Internet, overload situations can only be avoided by having the end systems deploying congestion cont...
Dorgham Sisalem, Adam Wolisz
SIGMETRICS
2008
ACM
214views Hardware» more  SIGMETRICS 2008»
13 years 6 months ago
HMTT: a platform independent full-system memory trace monitoring system
Memory trace analysis is an important technology for architecture research, system software (i.e., OS, compiler) optimization, and application performance improvements. Many appro...
Yungang Bao, Mingyu Chen, Yuan Ruan, Li Liu, Jianp...
JSS
2002
63views more  JSS 2002»
13 years 6 months ago
Strategies for resolving inter-class data conflicts in mixed real-time database systems
Although many efficient concurrency control protocols have been proposed for real-time database systems, they are mainly designed for the systems with a single type of real-time t...
Kam-yiu Lam, Tei-Wei Kuo, Tony S. H. Lee
AIPR
2003
IEEE
14 years 2 days ago
Quick Response Airborne Deployment of Viper Muzzle Flash Detection and Location System During DC Sniper Attacks
The VIPER infrared muzzle flash detection system was deployed from a helicopter and an airship in response to the Washington, DC area sniper attacks in October 2002. The system co...
M. Pauli, M. C. Ertem, E. Heidhausen