Sciweavers

1050 search results - page 191 / 210
» Two methods of authenticated positioning
Sort
View
ICRA
2003
IEEE
126views Robotics» more  ICRA 2003»
15 years 5 months ago
Experimental analysis of an innovative prosthetic hand with proprioceptive sensors
— This paper presents an underactuated artificial hand intended for functional replacement of the natural hand in upper limb amputees. The natural hand has three basic functiona...
Maria Chiara Carrozza, Fabrizio Vecchi, F. Sebasti...
AGTIVE
2003
Springer
15 years 5 months ago
Modeling Discontinuous Constituents with Hypergraph Grammars
Discontinuous constituent are a frequent problem in natural language analyses. A constituent is called discontinuous if it is interrupted by other constituents. In German they can ...
Ingrid Fischer
USENIX
2008
15 years 2 months ago
LeakSurvivor: Towards Safely Tolerating Memory Leaks for Garbage-Collected Languages
Continuous memory leaks severely hurt program performance and software availability for garbage-collected programs. This paper presents a safe method, called LeakSurvivor, to tole...
Yan Tang, Qi Gao, Feng Qin
BMCBI
2007
135views more  BMCBI 2007»
14 years 11 months ago
Detecting multivariate differentially expressed genes
Background: Gene expression is governed by complex networks, and differences in expression patterns between distinct biological conditions may therefore be complex and multivariat...
Roland Nilsson, José M. Peña, Johan ...
SIAMCOMP
2008
107views more  SIAMCOMP 2008»
14 years 11 months ago
Holographic Algorithms
Leslie Valiant recently proposed a theory of holographic algorithms. These novel algorithms achieve exponential speed-ups for certain computational problems compared to naive algo...
Leslie G. Valiant