Sciweavers

230 search results - page 38 / 46
» Cryptanalysis of the Quadratic Generator
Sort
View
INFORMATICALT
2002
154views more  INFORMATICALT 2002»
13 years 7 months ago
Adaptive Stable Control of Manipulators with Improved Adaptation Transients by Using On-line Supervision of the Free-Parameters
An adaptive control scheme for mechanical manipulators is proposed. The control loop essentially consists of a network for learning the robot's inverse dynamics and on-line ge...
Manuel de la Sen, Ana Almansa
SIAMJO
2002
159views more  SIAMJO 2002»
13 years 7 months ago
Locating the Least 2-Norm Solution of Linear Programs via a Path-Following Method
A linear program has a unique least 2-norm solution provided that the linear program has a solution. To locate this solution, most of the existing methods were devised to solve cer...
Yun-Bin Zhao, Duan Li
IJISTA
2007
136views more  IJISTA 2007»
13 years 7 months ago
Optimisation-on-a-manifold for global registration of multiple 3D point sets
: We propose a novel algorithm to register multiple 3D point sets within a common reference frame simultaneously. Our approach performs an explicit optimisation on the manifold of ...
Shankar Krishnan, Pei Yean Lee, John B. Moore, Sur...
NECO
2007
115views more  NECO 2007»
13 years 7 months ago
Training Recurrent Networks by Evolino
In recent years, gradient-based LSTM recurrent neural networks (RNNs) solved many previously RNN-unlearnable tasks. Sometimes, however, gradient information is of little use for t...
Jürgen Schmidhuber, Daan Wierstra, Matteo Gag...
DLT
2009
13 years 5 months ago
Closures in Formal Languages and Kuratowski's Theorem
A famous theorem of Kuratowski states that, in a topological space, at most 14 distinct sets can be produced by repeatedly applying the operations of closure and complement to a gi...
Janusz A. Brzozowski, Elyot Grant, Jeffrey Shallit