— This paper proposes a control scheme dedicated to underactuated fingers with the intention of maximizing the capabilities of the latter using tactile and position information ...
This paper points out some drawbacks and proposes some modifications to the conventional layer-by-layer BP algorithm. In particular, we present a new perspective to the learning ra...
Xu-Qin Li, Fei Han, Tat-Ming Lok, Michael R. Lyu, ...
Evaluation and applicability of many database techniques, ranging from access methods, histograms, and optimization strategies to data normalization and mining, crucially depend o...
Abstract. Exponentiation is a central process in many public-key cryptosystems such as RSA and DH. This paper introduces the concept of self-randomized exponentiation as an efficie...
In this work, a novel search strategy for autonomous search and rescue robots, that is highly suitable for the environments when the aid of human rescuers or search dogs is complet...