— In this paper, we develop a theory of computable types suitable for the study of control systems. The theory uses type-two effectivity as the underlying computational model, bu...
Robots often incorporate computational models of visual attention to streamline processing. Even though the number of visual attention systems employed on robots has increased dram...
Anomaly detectors have become a necessary component of the computer and information security framework. Some of the numerous drawbacks experienced by the current Anomaly detectors...
The needs of surgeons for computer-assisted systems cannot be satisfied unless their requirements and expectations are known. We determined surgeons' needs for computer-aided ...
Sarah Graham, Russell H. Taylor, Michael W. Vannie...