Sciweavers

2250 search results - page 17 / 450
» Authorizing applications in singularity
Sort
View
76
Voted
ICRA
2003
IEEE
112views Robotics» more  ICRA 2003»
15 years 2 months ago
Cartesian impedance control of redundant robots: recent results with the DLR-light-weight-arms
— This paper addresses the problem of impedance control for flexible joint robots based on a singular perturbation approach. Some aspects of the impedance controller, which turn...
Alin Albu-Schäffer, Christian Ott, Udo Frese,...
COMPUTING
2006
110views more  COMPUTING 2006»
14 years 9 months ago
An Alternative Algorithm for a Sliding Window ULV Decomposition
The ULV decomposition (ULVD) is an important member of a class of rank-revealing two-sided orthogonal decompositions used to approximate the singular value decomposition (SVD). Th...
H. Erbay, J. Barlow
JCPHY
2011
109views more  JCPHY 2011»
14 years 15 days ago
Fast construction of hierarchical matrix representation from matrix-vector multiplication
We develop a hierarchical matrix construction algorithm using matrixvector multiplications, based on the randomized singular value decomposition of low-rank matrices. The algorith...
Lin Lin, Jianfeng Lu, Lexing Ying
164
Voted
ICDE
2007
IEEE
118views Database» more  ICDE 2007»
15 years 11 months ago
Fine Grained Authorization Through Predicated Grants
Authorization in SQL is currently at the level of tables or columns. Many applications need a finer level of control. We propose a model for fine-grained authorization based on ad...
Surajit Chaudhuri, Tanmoy Dutta, S. Sudarshan
102
Voted
DIM
2007
ACM
15 years 1 months ago
Using reputation to augment explicit authorization
Online social networks are formed when web applications allow users to contribute to an online community. The explosive growth of these social networks taxes the management capaci...
Phillip J. Windley, Devlin Daley, Bryant Cutler, K...