Now showing items 11-20 of 429
Differentiation of ventricular tachycardia from ventricular fibrillation using intraventricular electrogram morphology
(Elsevier, 1992-09-15)
Implantable antitachycardia devices are now capable of providing "ramp" therapy including antitachycardia pacing and low- and high-energy cardioversion for sustained ventricular tachycardia (VT) in addition to defibrillation ...
Stratified least fixpoint logic
(Elsevier, 1994-08-29)
Stratified least fixpoint logic, or SLFP, characterizes the expressibility of stratified logic programs and, in a different formulation, has been used as a logic of imperative programs. These two formulations of SLFP are ...
Taking a LITTLE WORK Along
(Center for Information Technology Integration, 1991-08-28)
The continuing micro-miniaturization of components has moved high-powered, microprocessor-based machines from the desktop, to the laptop, to notebook-sized, and now to palmtop computers. These machines are distinguished ...
Improved Penalized Likelihood Reconstruction of Anatomically Correlated Mmission Data
(IEEE, 1996-09-16)
This paper presents a method for incorporating anatomical NMR boundary side information into penalized maximum likelihood (PML) emission image reconstructions. The NMR boundary is parameterized as a periodic spline curve ...
Detection of intermediate protein conformations by room temperature tryptophan phosphorescence spectroscopy during denaturation of Escherichia coli alkaline phosphatase
(Elsevier, 1993-12)
The reversible denaturation of Escherichia coli alkaline phosphatase (AP) was followed by monitoring changes in enzymatic activity as well as by measurements of the time-resolved room temperature phosphorescence from Trp ...
Regular languages in NC1
(Elsevier, 1992-06)
We give several characterizations, in terms of formal logic, semigroup theory, and operations on languages, of the regular languages in the circuit complexity class AC0, thus answering a question of Chandra, Fortune, and ...
Access Control in a Workstation-Based Distributed Computing Environment
(Center for Information Technology Integration, 1990-07-17)
This paper describes the mechanisms employed to control access to system services on the IFS project. We base our distributed computing environment on systems that we trust, and run those systems in physically secure rooms. ...
Toward a theory of honesty and trust among communicating autonomous agents
(Kluwer Academic Publishers; Springer Science+Business Media, 1993-09)
This article outlines, through a number of examples, a method that can be used by autonomous agents to decide among potential messages to send to other agents, without having to assume that a message must be truthful and ...