Cartoon animation techniques have previously been used to enhance the illusion of direct manipulation in 2D graphical user interfaces. In particular, animation may be used to conv...
During teleoperation, a human operator often receives only 2-D visual feedback from the remote environment. While a variety of kinematic sensors exist on the remote manipulator fo...
The contribution of this paper is the expansion of the range of possibilities in the analysis, planning, and control of contact tasks. The successful execution of any contact task...
Most public key crypto systems use finite field modulo arithmetic. This modulo arithmetic is applied on real numbers, binary values and polynomial functions. The computation cost ...
A Riemannian-geometry approach for control and stabilization of dynamics of object manipulation under holonomic or non-holonomic (but Pfaffian) constraints is presented. First, pos...