: Design of secure systems can often be expressed as ensuring that some property is maintained at every step of a distributed computation among mutually-untrusting parties. Special...
Cyber-physical systems increasingly rely on dynamically adaptive programs to respond to changes in their physical environment; examples include ecosystem monitoring and disaster r...
The developments in wavelet theory have given rise to the wavelet thresholding method, for extracting a signal from noisy data [1,2]. Multiwavelets, wavelets with several scaling ...
— EMG-to-force estimation for voluntary muscle contraction has many applications in human-machine interaction, motion analysis, and rehabilitation robotics for prosthetic limbs o...
Mitsuhiro Hayashibe, David Guiraud, Philippe Poign...
— In this paper we present a methodology to drive the end effector of a robotic manipulator across the surface of an object in the workspace, and at the same time the manipulator...
Xanthi Papageorgiou, Savvas G. Loizou, Kostas J. K...