Sciweavers

8928 search results - page 1586 / 1786
» Modeling Current Events
Sort
View
122
Voted
IJRR
2007
90views more  IJRR 2007»
15 years 3 months ago
Assessment of Tissue Damage due to Mechanical Stresses
t – While there are many benefits to minimally invasive surgery, force feedback, or touch sensation, is lacking in the currently available MIS tools, including surgical robots, c...
Smita De, Jacob Rosen, Aylon Dagan, Blake Hannafor...
TALG
2008
124views more  TALG 2008»
15 years 3 months ago
Uniform deterministic dictionaries
Abstract. We present a new analysis of the well-known family of multiplicative hash functions, and improved deterministic algorithms for selecting "good" hash functions. ...
Milan Ruzic
118
Voted
TASLP
2008
99views more  TASLP 2008»
15 years 3 months ago
Epoch Extraction From Speech Signals
Epoch is the instant of significant excitation of the vocal-tract system during production of speech. For most voiced speech, the most significant excitation takes place around the...
K. S. R. Murty, B. Yegnanarayana
126
Voted
TDP
2008
67views more  TDP 2008»
15 years 3 months ago
Generating Sufficiency-based Non-Synthetic Perturbed Data
The mean vector and covariance matrix are sufficient statistics when the un derlying distribution is multivariate normal. Many type of statistical analyses used in practice rely on...
Krishnamurty Muralidhar, Rathindra Sarathy
165
Voted
TDSC
2008
152views more  TDSC 2008»
15 years 3 months ago
Towards Formal Verification of Role-Based Access Control Policies
Specifying and managing access control policies is a challenging problem. We propose to develop formal verification techniques for access control policies to improve the current s...
Somesh Jha, Ninghui Li, Mahesh V. Tripunitara, Qih...
« Prev « First page 1586 / 1786 Last » Next »