Results 31 to 40 of about 2,323,033 (301)
A Robust Adaptive One‐Sample‐Ahead Preview Super‐Twisting Sliding Mode Controller
Block Diagram of the Robust Adaptive One‐Sample‐Ahead Preview Super‐Twisting Sliding Mode Controller. ABSTRACT This article introduces a discrete‐time robust adaptive one‐sample‐ahead preview super‐twisting sliding mode controller. A stability analysis of the controller by Lyapunov criteria is developed to demonstrate its robustness in handling both ...
Guilherme Vieira Hollweg +5 more
wiley +1 more source
Parents Anonymous Outcome Evaluation: Promising Findings for Child Maltreatment Reduction [PDF]
Parents Anonymous(R) mutual support groups for parents are aimed at strengthening families and reducing child maltreatment. NCCD performed a national evaluation to assess whether parent participation in Parents Anonymous(R) was associated with change in ...
core
HandiVote: simple, anonymous, and auditable electronic voting [PDF]
We suggest a set of procedures utilising a range of technologies by which a major democratic deficit of modern society can be addressed. The mechanism, whilst it makes limited use of cryptographic techniques in the background, is based around objects and ...
Cockshott, W.P., Renaud, K.
core +1 more source
The Future of Research in Cognitive Robotics: Foundation Models or Developmental Cognitive Models?
Research in cognitive robotics founded on principles of developmental psychology and enactive cognitive science would yield what we seek in autonomous robots: the ability to perceive its environment, learn from experience, anticipate the outcome of events, act to pursue goals, and adapt to changing circumstances without resorting to training with ...
David Vernon
wiley +1 more source
$K$-anonymous Signaling Scheme [PDF]
We incorporate signaling scheme into Ad Auction setting, to achieve better welfare and revenue while protect users' privacy. We propose a new \emph{$K$-anonymous signaling scheme setting}, prove the hardness of the corresponding welfare/revenue ...
Chen, Binyi, Liu, Tie-Yan, Qin, Tao
core
Lower Bound for Envy-Free and Truthful Makespan Approximation on Related Machines
We study problems of scheduling jobs on related machines so as to minimize the makespan in the setting where machines are strategic agents. In this problem, each job $j$ has a length $l_{j}$ and each machine $i$ has a private speed $t_{i}$.
Fleischer, Lisa, Wang, Zhenghui
core +2 more sources
On Iterated Dominance, Matrix Elimination, and Matched Paths [PDF]
We study computational problems arising from the iterated removal of weakly dominated actions in anonymous games. Our main result shows that it is NP-complete to decide whether an anonymous game with three actions can be solved via iterated weak ...
Brandt, Felix +2 more
core +5 more sources
Auditory–Tactile Congruence for Synthesis of Adaptive Pain Expressions in RoboPatients
In this work, we explore auditory–tactile congruence for synthesizing adaptive vocal pain expressions in robopatients. Using a robopatient platform that integrates vocal pain sounds with palpation forces, we conducted 7680 trials across 20 participants.
Saitarun Nadipineni +4 more
wiley +1 more source
Anonymity In Cyberspace: Judicial and Legislative Regulations [PDF]
Historically, the scope of constitutional protections for fundamental rights has evolved to keep pace with new social norms and new technology. Internet speech is on the rise. The First Amendment protects an individual’s right to speak anonymously, but
Qasir, Sophia
core +1 more source
Octopus: A Secure and Anonymous DHT Lookup [PDF]
Distributed Hash Table (DHT) lookup is a core technique in structured peer-to-peer (P2P) networks. Its decentralized nature introduces security and privacy vulnerabilities for applications built on top of them; we thus set out to design a lookup ...
Borisov, Nikita, Wang, Qiyan
core +1 more source

