Sciweavers

953 search results - page 118 / 191
» Constraint Based Transformation Theory
Sort
View
ICRA
2000
IEEE
126views Robotics» more  ICRA 2000»
15 years 1 months ago
Identification and Decoupling Control of Flexure Jointed Hexapods
By exploiting properties of the joint space mass-inertia matrix of flexure jointed hexapods, a new decoupling method is proposed. The new decoupling method, through a static input...
Yixin Chen, John E. McInroy
SIGPRO
2010
122views more  SIGPRO 2010»
14 years 8 months ago
Parameter estimation for exponential sums by approximate Prony method
The recovery of signal parameters from noisy sampled data is a fundamental problem in digital signal processing. In this paper, we consider the following spectral analysis problem...
Daniel Potts, Manfred Tasche
IPSN
2010
Springer
15 years 4 months ago
Covering space for in-network sensor data storage
For in-network storage schemes, one maps data, indexed in a logical space, to the distributed sensor locations. When the physical sensor network has an irregular shape and possibl...
Rik Sarkar, Wei Zeng, Jie Gao, Xianfeng David Gu
GECCO
2007
Springer
137views Optimization» more  GECCO 2007»
15 years 4 months ago
Extended probe method for linkage discovery over high-cardinality alphabets
The work addresses the problem of identifying the epistatic linkage of a function from high cardinality alphabets to the real numbers. It is a generalization of Heckendorn and Wri...
Shude Zhou, Zengqi Sun, Robert B. Heckendorn
PROVSEC
2007
Springer
15 years 4 months ago
Formal Proof of Provable Security by Game-Playing in a Proof Assistant
Game-playing is an approach to write security proofs that are easy to verify. In this approach, security definitions and intractable problems are written as programs called games ...
Reynald Affeldt, Miki Tanaka, Nicolas Marti