Sciweavers

1700 search results - page 290 / 340
» Specifying and implementing refactorings
Sort
View
MICCAI
2000
Springer
15 years 3 months ago
Motion-Based Robotic Instrument Targeting under C-Arm Fluoroscopy
: We present a simple and precise robot targeting method under portable x-ray fluoroscopy based on image servoing. The method is implemented for needle alignment in percutaneous pr...
Alexandru Patriciu, Dan Stoianovici, Louis L. Whit...
ATAL
1997
Springer
15 years 3 months ago
A Formal Specification of dMARS
The Procedural Reasoning System (PRS) is the best established agent architecture currently available. It has been deployed in many major industrial applications, ranging from fault...
Mark d'Inverno, David Kinny, Michael Luck, Michael...
MFCS
1995
Springer
15 years 3 months ago
An Abstract Account of Composition
act Account of Composition Mart n Abadi1 and Stephan Merz2 1 Digital Equipment Corporation, Systems Research Center, 130 Lytton Avenue, Palo Alto, CA 94301, U.S.A. 2 Institut fur I...
Martín Abadi, Stephan Merz
FAST
2008
15 years 2 months ago
SWEEPER: An Efficient Disaster Recovery Point Identification Mechanism
Data corruption is one of the key problems that is on top of the radar screen of most CIOs. Continuous Data Protection (CDP) technologies help enterprises deal with data corruptio...
Akshat Verma, Kaladhar Voruganti, Ramani Routray, ...
CCS
2008
ACM
15 years 1 months ago
Minimal backups of cryptographic protocol runs
As cryptographic protocols execute they accumulate information such as values and keys, and evidence of properties about this information. As execution proceeds, new information b...
Jay A. McCarthy, Shriram Krishnamurthi