Sciweavers

4529 search results - page 76 / 906
» Position Based Cryptography
Sort
View
237
Voted
AR
2011
14 years 11 months ago
Imitation Learning of Positional and Force Skills Demonstrated via Kinesthetic Teaching and Haptic Input
A method to learn and reproduce robot force interactions in a Human-Robot Interaction setting is proposed. The method allows a robotic manipulator to learn to perform tasks which ...
Petar Kormushev, Sylvain Calinon, Darwin G. Caldwe...
DASFAA
2007
IEEE
220views Database» more  DASFAA 2007»
15 years 11 months ago
LAPIN: Effective Sequential Pattern Mining Algorithms by Last Position Induction for Dense Databases
Sequential pattern mining is very important because it is the basis of many applications. Although there has been a great deal of effort on sequential pattern mining in recent year...
Zhenglu Yang, Yitong Wang, Masaru Kitsuregawa
IJCNN
2006
IEEE
15 years 11 months ago
In-Place Learning for Positional and Scale Invariance
— In-place learning is a biologically inspired concept, meaning that the computational network is responsible for its own learning. With in-place learning, there is no need for a...
Juyang Weng, Hong Lu, Tianyu Luwang, Xiangyang Xue
ICRA
1999
IEEE
109views Robotics» more  ICRA 1999»
15 years 9 months ago
Achieving Fine Absolute Positioning Accuracy in Large Powerful Manipulators
Important robotic tasks could be most effectively done by powerful and accurate manipulators. However, high accuracy is generally unattainable in manipulators capable of producing...
Marco A. Meggiolaro, Peter C. L. Jaffe, Steven Dub...
TSE
2008
89views more  TSE 2008»
15 years 4 months ago
WASP: Protecting Web Applications Using Positive Tainting and Syntax-Aware Evaluation
Many software systems have evolved to include a Web-based component that makes them available to the public via the Internet and can expose them to a variety of Web-based attacks. ...
William G. J. Halfond, Alessandro Orso, Pete Manol...