Limitations in modern sensing technologies result in large errors in sensed target object geometry and location in unstructured environments. As a result, positioning a robotic end...
Aaron M. Dollar, Leif P. Jentoft, Jason H. Gao, Ro...
In this paper, we propose a complete model handling the physical simulation of deformable 1D objects. We formulate continuous expressions for stretching, bending and twisting ener...
Adrien Theetten, Laurent Grisoni, Claude Andriot, ...
This paper presents methods for photo-realistic rendering using strongly spatially variant illumination captured from real scenes. The illumination is captured along arbitrary pat...
Jonas Unger, Stefan Gustavson, P. Larsson, Anders ...
Let G = (V, E, w) be a graph with vertex and edge sets V and E, respectively, and w : E IR+ a function which assigns a positive weight or length to each edge of G. G is called a r...
Abstract. Network Intrusion Detection Systems (NIDS) monitor a network with the aim of discerning malicious from benign activity on that network. While a wide range of approaches h...