Sciweavers

1592 search results - page 211 / 319
» The state of the email address
Sort
View
HICSS
2005
IEEE
173views Biometrics» more  HICSS 2005»
15 years 6 months ago
Implementing Rule-Based Monitors within a Framework for Continuous Requirements Monitoring
With the increasing complexity of information systems, it is becoming increasingly unclear as to how information system behaviors relate to stated requirements. Although requireme...
William N. Robinson
ICAC
2005
IEEE
15 years 6 months ago
Myrrh: A Transaction-Based Model for Autonomic Recovery
As software comes under increasing scrutiny for its lack of safety and reliability, numerous static and partially dynamic tools (including model checking) have been proposed for v...
Guy Eddon, Steven P. Reiss
84
Voted
ICRA
2005
IEEE
136views Robotics» more  ICRA 2005»
15 years 6 months ago
A Circular Needle Path Planning Method for Suturing in Laparoscopic Surgery
— The work presented in this paper addresses the problem of the stitching task in laparoscopic surgery using a circular needle and a conventional 4 DOFs needle-holder. This task ...
Florent Nageotte, Philippe Zanne, Michel de Mathel...
108
Voted
ISCA
2005
IEEE
126views Hardware» more  ISCA 2005»
15 years 6 months ago
A Tree Based Router Search Engine Architecture with Single Port Memories
Pipelined forwarding engines are used in core routers to meet speed demands. Tree-based searches are pipelined across a number of stages to achieve high throughput, but this resul...
Florin Baboescu, Dean M. Tullsen, Grigore Rosu, Su...
ISIPTA
2005
IEEE
140views Mathematics» more  ISIPTA 2005»
15 years 6 months ago
Conservative Rules for Predictive Inference with Incomplete Data
This paper addresses the following question: how should we update our beliefs after observing some incomplete data, in order to make credible predictions about new, and possibly i...
Marco Zaffalon