— We present a simple, intuitive argument based on “invariant imbedding” in the spirit of dynamic programming to derive a stagewise second-order backpropagation (BP) algorith...
Fault induction attacks are a serious concern for designers of secure embedded systems. An ideal solution would be a generic circuit transformation that would produce circuits tha...
In this paper, we present an image-based method for the tracking and rendering of faces. We use the algorithm in an immersive video conferencing system where multiple participants...
— This paper introduces a multifingered robotic hand eNAIST-Handf and a grip force control by slip margin feedback. The developed prototype finger of the NAISThand has a new me...
Jun Ueda, Y. Ishida, Masahiro Kondo, Tsukasa Ogasa...
We investigate methods for providing easy-to-check proofs of computational effort. Originally intended for discouraging spam, the concept has wide applicability as a method for co...