Sciweavers

275 search results - page 21 / 55
» The double CFTP method
Sort
View
ICANN
2005
Springer
14 years 3 months ago
Interpolation Mechanism of Functional Networks
In this paper, the interpolation mechanism of functional networks is discussed. A kind of fourlayer (with 1 input and 1 output unit) and a five-layer (with double input and single...
Yong-Quan Zhou, Licheng Jiao
FSE
2001
Springer
109views Cryptology» more  FSE 2001»
14 years 2 months ago
Bias in the LEVIATHAN Stream Cipher
We show two methods of distinguishing the LEVIATHAN stream cipher from a random stream using 236 bytes of output and proportional effort; both arise from compression within the ci...
Paul Crowley, Stefan Lucks
ANLP
2000
111views more  ANLP 2000»
13 years 11 months ago
Bagging and Boosting a Treebank Parser
Bagging and boosting, two effective machine learning techniques, are applied to natural language parsing. Experiments using these techniques with a trainable statistical parser ar...
John C. Henderson, Eric Brill
BMEI
2009
IEEE
13 years 11 months ago
Active and Passive Control of an Exoskeleton with Cable Transmission for Hand Rehabilitation
This paper investigates the control algorithm of an exoskeleton for hand rehabilitation, which accomplishes both active and passive control mode. A double closed loop control struc...
Shuang Wang, Jiting Li, Yuru Zhang, Ju Wang
IROS
2009
IEEE
190views Robotics» more  IROS 2009»
14 years 4 months ago
3D pose and velocity visual tracking based on sequential region of interest acquisition
— This paper presents a high speed visual tracking method based on non simultaneous subimages acquisition. This method is formulated as a virtual visual servoing scheme. The sequ...
Redwan Dahmouche, Nicolas Andreff, Youcef Mezouar,...