Sciweavers

791 search results - page 69 / 159
» Characterizing zero-derivative points
Sort
View
CDC
2009
IEEE
173views Control Systems» more  CDC 2009»
14 years 2 months ago
Virtual holonomic constraint approach for planar bipedal walking robots extended to double support
The concept of virtual holonomic constraints is extended to the case of double support, which is characterized by a closed kinematic chain and redundancy in the state variables. An...
Michael Scheint, Marion Sobotka, Martin Buss
FSE
2007
Springer
142views Cryptology» more  FSE 2007»
14 years 2 months ago
A New Class of Weak Keys for Blowfish
The reflection attack is a recently discovered self similarity analysis which is usually mounted on ciphers with many fixed points. In this paper, we describe two reflection attack...
Orhun Kara, Cevat Manap
FGR
2004
IEEE
212views Biometrics» more  FGR 2004»
14 years 1 months ago
Automatic 3D Face Recognition Combining Global Geometric Features with Local Shape Variation Information
Face recognition is a focused issue in pattern recognition over the past decades. In this paper, we have proposed a new scheme for face recognition using 3D information. In this s...
Chenghua Xu, Yunhong Wang, Tieniu Tan, Long Quan
DLOG
2008
14 years 12 days ago
A Survey of Revision Approaches in Description Logics
Abstract. Revision of a Description Logic-based ontology to incorporate newly received information consistently is an important problem for the lifecycle of ontologies. Many approa...
Guilin Qi, Fangkai Yang
EUC
2008
Springer
13 years 12 months ago
RT-P2P: A Scalable Real-Time Peer-to-Peer System with Probabilistic Timing Assurances
We present RT-P2P, a real-time peer-to-peer (P2P) system that allows application-level end-to-end timing requirements to be satisfied in P2P systems. P2P systems are fundamentally...
Fei Huang, Binoy Ravindran, E. Douglas Jensen