In this paper, the interpolation mechanism of functional networks is discussed. A kind of fourlayer (with 1 input and 1 output unit) and a five-layer (with double input and single...
We show two methods of distinguishing the LEVIATHAN stream cipher from a random stream using 236 bytes of output and proportional effort; both arise from compression within the ci...
Bagging and boosting, two effective machine learning techniques, are applied to natural language parsing. Experiments using these techniques with a trainable statistical parser ar...
This paper investigates the control algorithm of an exoskeleton for hand rehabilitation, which accomplishes both active and passive control mode. A double closed loop control struc...
— This paper presents a high speed visual tracking method based on non simultaneous subimages acquisition. This method is formulated as a virtual visual servoing scheme. The sequ...
Redwan Dahmouche, Nicolas Andreff, Youcef Mezouar,...