Sciweavers

796 search results - page 62 / 160
» Spoofing prevention method
Sort
View
ICRA
2005
IEEE
119views Robotics» more  ICRA 2005»
14 years 3 months ago
Fuzzy Enhanced Control of an Underactuated Finger Using Tactile and Position Sensors
— This paper proposes a control scheme dedicated to underactuated fingers with the intention of maximizing the capabilities of the latter using tactile and position information ...
Lionel Birglen, Clément Gosselin
ICIC
2005
Springer
14 years 3 months ago
Improvements to the Conventional Layer-by-Layer BP Algorithm
This paper points out some drawbacks and proposes some modifications to the conventional layer-by-layer BP algorithm. In particular, we present a new perspective to the learning ra...
Xu-Qin Li, Fei Han, Tat-Ming Lok, Michael R. Lyu, ...
VLDB
2005
ACM
81views Database» more  VLDB 2005»
14 years 3 months ago
Flexible Database Generators
Evaluation and applicability of many database techniques, ranging from access methods, histograms, and optimization strategies to data normalization and mining, crucially depend o...
Nicolas Bruno, Surajit Chaudhuri
CTRSA
2004
Springer
96views Cryptology» more  CTRSA 2004»
14 years 3 months ago
Self-Randomized Exponentiation Algorithms
Abstract. Exponentiation is a central process in many public-key cryptosystems such as RSA and DH. This paper introduces the concept of self-randomized exponentiation as an efficie...
Benoît Chevallier-Mames
ROBOCUP
2004
Springer
127views Robotics» more  ROBOCUP 2004»
14 years 3 months ago
A Novel Search Strategy for Autonomous Search and Rescue Robots
In this work, a novel search strategy for autonomous search and rescue robots, that is highly suitable for the environments when the aid of human rescuers or search dogs is complet...
Sanem Sariel, H. Levent Akin