103 papers:
- CASE-2015-HaseliradN #3d #novel
- A novel Kinect-based system for 3D moving object interception with a 5-DOF robotic arm (AH, JN), pp. 117–124.
- CASE-2015-HuangHCC #performance #synthesis
- Efficient grasp synthesis and control strategy for robot hand-arm system (MBH, HPH, CCC, CAC), pp. 1256–1257.
- CASE-2015-LaskeyMMPPBKAG #2d #modelling #multi #nondeterminism
- Multi-armed bandit models for 2D grasp planning with uncertainty (ML, JM, ZM, FTP, SP, JPvdB, DK, PA, KG), pp. 572–579.
- CASE-2015-LiuZ #adaptation #human-computer #modelling #predict #process
- Adaptive predictive ANFIS based human arm movement modeling and control in machine-human cooperative GTAW process (YL, YZ), pp. 1465–1470.
- CASE-2015-PanZQ #clustering #how #process #tool support
- How to start-up dual-arm cluster tools involving a wafer revisiting process (CP, MZ, YQ), pp. 1194–1199.
- CASE-2015-SuWCRT #adaptation #fuzzy #learning
- Adaptive PD fuzzy control with dynamic learning rate for two-wheeled balancing six degrees of freedom robotic arm (SFS, KJW, MCC, IJR, CCT), pp. 1258–1261.
- CASE-2015-ZhuQZ #clustering #modelling #multi #petri net #scheduling #tool support
- Petri net modeling and one-wafer scheduling of single-arm tree-like multi-cluster tools (QZ, YQ, MZ), pp. 292–297.
- ITiCSE-2015-MellettiGD
- The JaeOS Project and the μARM Emulator (MM, MG, RD), pp. 3–8.
- FM-2015-Evans #authentication #development
- Software Development and Authentication for Arms Control Information Barriers (NE), pp. 581–584.
- CHI-2015-Ruiz0 #bias #constraints #elicitation #gesture #legacy #performance
- Soft-Constraints to Reduce Legacy and Performance Bias to Elicit Whole-body Gestures with Low Arm Fatigue (JR, DV), pp. 3347–3350.
- CSCW-2015-SavageM #analysis #online
- Participatory Militias: An Analysis of an Armed Movement’s Online Audience (SS, AMH), pp. 724–733.
- DHM-EH-2015-CheffiRBBS #approach #cost analysis #feedback #optimisation
- A Bi-level Optimization Approach to Get an Optimal Combination of Cost Functions for Pilot’s Arm Movement: The Case of Helicopter’s Flying Aid Functions with Haptic Feedback (SC, TR, LB, PB, JCS), pp. 248–257.
- DHM-EH-2015-SirisuwanYYH #process
- EMG Activity of Arms Muscles and Body Movement During Chucking in Lathebetween Expert and Non-expert (PS, HY, TY, HH), pp. 216–226.
- DHM-HM-2015-ChottikamponTMS #comparison #metric
- Comparison Knitting Skills Between Experts and Non-experts by Measurement of the Arm Movement (KC, ST, SM, PS, MI, HN, HH), pp. 3–13.
- ICEIS-v1-2015-BurtiniLL #multi #online
- Improving Online Marketing Experiments with Drifting Multi-armed Bandits (GB, JL, RL), pp. 630–636.
- ICML-2015-CarpentierV #infinity
- Simple regret for infinitely many armed bandits (AC, MV), pp. 1133–1141.
- ICML-2015-KomiyamaHN #analysis #multi #probability #problem
- Optimal Regret Analysis of Thompson Sampling in Stochastic Multi-armed Bandit Problem with Multiple Plays (JK, JH, HN), pp. 1152–1161.
- ICML-2015-SzorenyiBWH #approach #multi
- Qualitative Multi-Armed Bandits: A Quantile-Based Approach (BS, RBF, PW, EH), pp. 1660–1668.
- CASE-2014-CunninghamKSWKBW #mobile #named
- Jamster: A mobile dual-arm assistive robot with Jamboxx control (AC, WKH, US, DW, DK, JB, JTW), pp. 509–514.
- CASE-2014-LiWGC #assembly #case study
- A pilot study of dual 7-axis -arm robot in small part assembly application (QL, GW, HG, ZC), pp. 196–201.
- CASE-2014-YangWQZ #clustering #multi #scheduling #tool support
- Optimal scheduling of single-arm multi-cluster tools with two-space buffering modules (FY, NW, YQ, MZ), pp. 75–80.
- CASE-2014-ZhuWQZ #analysis #clustering #constraints #modelling #multi #petri net #scheduling #tool support
- Modeling and schedulability analysis of single-arm multi-cluster tools with residency time constraints via Petri nets (QZ, NW, YQ, MZ), pp. 81–86.
- DAC-2014-ClercqUHV #implementation #power management
- Ultra Low-Power implementation of ECC on the ARM Cortex-M0+ (RdC, LU, AVH, IV), p. 6.
- DAC-2014-HerrewegeV
- Software Only, Extremely Compact, Keccak-based Secure PRNG on ARM Cortex-M (AVH, IV), p. 6.
- CHI-2014-Hincapie-RamosGMI #interactive #metric
- Consumed endurance: a metric to quantify arm fatigue of mid-air interactions (JDHR, XG, PM, PI), pp. 1063–1072.
- HIMI-DE-2014-ItoW #challenge #communication
- Three Key Challenges in ARM-COMS for Entrainment Effect Acceleration in Remote Communication (TI, TW), pp. 177–186.
- CIKM-2014-NguyenL #clustering #multi
- Dynamic Clustering of Contextual Multi-Armed Bandits (TTN, HWL), pp. 1959–1962.
- ICML-c2-2014-ZhouCL #crowdsourcing #identification #multi
- Optimal PAC Multiple Arm Identification with Applications to Crowdsourcing (YZ, XC, JL), pp. 217–225.
- ICML-c2-2014-ZoghiWMR #bound #problem
- Relative Upper Confidence Bound for the K-Armed Dueling Bandit Problem (MZ, SW, RM, MdR), pp. 10–18.
- SAC-2014-PereiraS #complexity #deduction #source code
- Complexity checking of ARM programs, by deduction (MP, SMdS), pp. 1309–1314.
- ASPLOS-2014-DallN #design #implementation #linux #named
- KVM/ARM: the design and implementation of the linux ARM hypervisor (CD, JN), pp. 333–348.
- ASPLOS-2014-SantosRSW #mobile #runtime #using
- Using ARM trustzone to build a trusted language runtime for mobile applications (NS, HR, SS, AW), pp. 67–80.
- CASE-2013-JiangSCBG #synthesis
- Moving trajectories and controller synthesis for an assistive device for arm rehabilitation (LJ, RS, MHMC, LEB, GG), pp. 268–273.
- CASE-2013-JinM #algorithm #clustering #constraints #scheduling #tool support
- Transient scheduling of single armed cluster tools: Algorithms for wafer residency constraints (HYJ, JRM), pp. 856–861.
- CASE-2013-KimLK #clustering #scheduling #tool support
- Optimal scheduling of transient cycles for single-armed cluster tools (DKK, TEL, HJK), pp. 874–879.
- CASE-2013-KruseRW #framework
- A sensor-based dual-arm tele-robotic manipulation platform (DK, RJR, JTW), pp. 350–355.
- CASE-2013-MilneBPCHGP #feedback
- Robotic arm kinematics and bilateral haptic feedback over an ethernet communications link (BM, GB, SP, XC, CEH, AG, RP), pp. 960–965.
- CASE-2013-QiaoWZ #clustering #scheduling #tool support
- Scheduling of time constrained dual-arm cluster tools with wafer revisiting (YQ, NW, MZ), pp. 868–873.
- CASE-2013-ShisheieJBC #design #string #using
- Design and fabrication of an assistive device for arm rehabilitation using twisted string system (RS, LJ, LEB, MHMC), pp. 255–260.
- CASE-2013-ZhuWQZ #clustering #modelling #multi #petri net #scheduling #tool support
- Petri net modeling and one-wafer scheduling of single-arm multi-cluster tools (QZ, NW, YQ, MZ), pp. 862–867.
- CSCW-2013-DoucetteGMNS #collaboration #how
- Sometimes when we touch: how arm embodiments change reaching and collaboration on digital tables (AD, CG, RLM, MAN, SS), pp. 193–202.
- CSCW-2013-GenestGTKI #distributed #game studies #named #tool support
- KinectArms: a toolkit for capturing and displaying arm embodiments in distributed tabletop groupware (AG, CG, AT, MK, ZI), pp. 157–166.
- DHM-HB-2013-KaoH
- Hand and Arm Support for Computer Workstation (GHK, TKPH), pp. 232–238.
- HCI-IMT-2013-SakataKN #analysis #collaboration #communication #scalability
- Communication Analysis of Remote Collaboration System with Arm Scaling Function (NS, TK, SN), pp. 378–387.
- HIMI-LCCB-2013-ItoW #communication #monitoring #named
- ARM-COMS: ARm-Supported eMbodied COmmunication Monitor System (TI, TW), pp. 307–316.
- ICML-c1-2013-BubeckWV #identification #multi
- Multiple Identifications in Multi-Armed Bandits (SB, TW, NV), pp. 258–265.
- ICML-c1-2013-ChenWY #combinator #framework #multi
- Combinatorial Multi-Armed Bandit: General Framework and Applications (WC, YW, YY), pp. 151–159.
- ICML-c2-2013-UrvoyCFN
- Generic Exploration and K-armed Voting Bandits (TU, FC, RF, SN), pp. 91–99.
- ICML-c3-2013-KarninKS #multi
- Almost Optimal Exploration in Multi-Armed Bandits (ZSK, TK, OS), pp. 1238–1246.
- RE-2013-ZarghamiVESW #identification #risk management
- Assumption-based risk identification method (ARM) in dynamic service provisioning (AZ, EV, MZE, MvS, RW), pp. 175–184.
- HPCA-2013-BlemMS #architecture
- Power struggles: Revisiting the RISC vs. CISC debate on contemporary ARM and x86 architectures (ERB, JM, KS), pp. 1–12.
- CASE-2012-DoPK
- Dual arm robot for packaging and assembling of IT products (HD, CP, JHK), pp. 1067–1070.
- CASE-2012-MatsumotoN #approach #clustering #composition #concurrent #petri net #scheduling #tool support
- Petri net decomposition approach to deadlock-free scheduling for dual-armed cluster tools (IM, TN), pp. 194–199.
- CASE-2012-QiaoWZ #analysis #clustering #petri net #scheduling #tool support
- Petri net-based scheduling analysis of dual-arm cluster tools with wafer revisiting (YQ, NW, MZ), pp. 206–211.
- CASE-2012-RyuOC #using
- COM control of dual arm robot using COM Jacobian (KR, YO, MC), pp. 1071–1073.
- CASE-2012-TonkeL #clustering #independence #scheduling
- Scheduling of a dual-armed cluster tool with two independent robot arms (DT, TEL), pp. 200–205.
- CASE-2012-WimbockRC #coordination #verification
- Derivation and verification of synergy coordinates for the DLR hand arm system (TW, JR, MC), pp. 454–460.
- CASE-2012-YouKLKLH #algorithm #assembly #development
- Development of manipulation planning algorithm for a dual-arm robot assembly task (JSY, DHK, SJL, SPK, JYL, CSH), pp. 1061–1066.
- DAC-2012-Jeff #architecture #migration #multi
- Big.LITTLE system architecture from ARM: saving power through heterogeneous multiprocessing and task context migration (BJ), pp. 1143–1146.
- CHI-2012-KratzMS #gesture
- Making gestural input from arm-worn inertial sensors more practical (LK, DM, TSS), pp. 1747–1750.
- ICML-2012-AvnerMS #multi
- Decoupling Exploration and Exploitation in Multi-Armed Bandits (OA, SM, OS), p. 145.
- ICML-2012-KalyanakrishnanTAS #multi #probability #set
- PAC Subset Selection in Stochastic Multi-armed Bandits (SK, AT, PA, PS), p. 34.
- CASE-2011-LeeL #clustering #concurrent #multi
- Concurrent processing of multiple wafer types in a single-armed cluster tool (JHL, TEL), pp. 102–107.
- CASE-2011-QiaoWZ #analysis #clustering #modelling #tool support
- Modeling and analysis of dual-arm cluster tools for wafer fabrication with revisiting (YQ, NW, MZ), pp. 90–95.
- SAC-2011-LeeKY #kernel #linux
- Experimenting with system and Libc call interception attacks on ARM-based Linux kernel (HcL, CHK, JHY), pp. 631–632.
- CASE-2010-WangL #3d #hybrid
- Hybrid impedance control of a 3-DOF robotic arm used for rehabilitation treatment (JW, YL), pp. 768–773.
- CASE-2010-WuZ #bound #clustering #petri net #process #scheduling #tool support
- Petri net-based scheduling of time-constrained dual-arm cluster tools with bounded activity time variation (NW, MZ), pp. 465–470.
- ICML-2010-KalyanakrishnanS #multi #performance #theory and practice
- Efficient Selection of Multiple Bandit Arms: Theory and Practice (SK, PS), pp. 511–518.
- HPDC-2010-GaustadFBE #development #standard
- The development of QC standards for ARM data products (KG, CF, SB, BE), pp. 548–553.
- CASE-2009-WuCCZ #approach #clustering #novel #scheduling #tool support
- A novel approach to scheduling of single-arm cluster tools with wafer revisiting (NW, FC, CC, MZ), pp. 567–572.
- DAC-2009-VillenaS #automation #modelling #multi #named
- ARMS — automatic residue-minimization based sampling for multi-point modeling techniques (JFV, LMS), pp. 951–956.
- ICALP-v2-2009-GuhaM #metric #multi
- Multi-armed Bandits with Metric Switching Costs (SG, KM), pp. 496–507.
- CHI-2009-HouseMB
- The VoiceBot: a voice controlled robot arm (BH, JM, JAB), pp. 183–192.
- DHM-2009-Wang #problem #re-engineering
- Problems Encountered in Seated Arm Reach Posture Reconstruction: Need for a More Realistic Spine and Upper Limb Kinematic Model (XW), pp. 160–169.
- LCTES-2009-MooreBCDH #architecture #challenge
- Addressing the challenges of DBT for the ARM architecture (RWM, JB, BRC, JWD, JH), pp. 147–156.
- CASE-2008-GuetaCAUO #configuration management #design #multi
- Design of the end-effector tool attachment for robot arm with multiple reconfigurable goals (LBG, RC, TA, TU, JO), pp. 876–881.
- CASE-2008-Kim #clustering #constraints
- Stable schedule for a single-armed cluster tool with time constraints (JHK), pp. 97–102.
- CASE-2008-NagarshethSP #modelling
- Modeling and dynamics of human arm (HJN, PVS, MAP), pp. 924–928.
- CASE-2008-PaekL #clustering #scheduling #strict #tool support
- Optimal scheduling of dual-armed cluster tools without swap restriction (JHP, TEL), pp. 103–108.
- CASE-2008-ShibataOEH
- Handling of hemmed fabrics by a single-armed robot (MS, TO, YE, SH), pp. 882–887.
- CASE-2008-WuZPCC #clustering #constraints #modelling #petri net #process #realtime #tool support
- Petri net modeling and real-time control of dual-arm cluster tools with residency time constraint and activity time variations (NW, MZ, SP, FC, CC), pp. 109–114.
- STOC-2008-KleinbergSU #metric #multi
- Multi-armed bandits in metric spaces (RK, AS, EU), pp. 681–690.
- ICML-2008-RadlinskiKJ #learning #multi #ranking
- Learning diverse rankings with multi-armed bandits (FR, RK, TJ), pp. 784–791.
- DHM-2007-FritzscheB #predict
- Prediction of Discomfort During Arm Movements (FF, HB), pp. 66–73.
- ICML-2007-PandeyCA #multi #problem
- Multi-armed bandit problems with dependent arms (SP, DC, DA), pp. 721–728.
- SEKE-2007-KangK #human-computer #interactive #novel
- Human-Computer Interaction for a Novel Arm-wrestling Robot (CgK, HyK), p. 676–?.
- CASE-2006-WuZ #clustering #constraints #petri net #scheduling #tool support
- Schedulability and Scheduling of Dual-Arm Cluster Tools with Residency Time Constraints Based on Petri Net (NW, MZ), pp. 87–92.
- LOPSTR-2006-AbdennadherOST #automation #mining #named
- ARM: Automatic Rule Miner (SA, AO, NS, AT), pp. 17–25.
- SAC-2006-SilveiraSNDF #component #named #repository #representation
- X-ARM: an asset representation model for component repository systems (GEdS, MS, YN, JDJ, SMF), pp. 1690–1694.
- SAC-2005-DebbabiMT #compilation #embedded #java #virtual machine
- Armed E-Bunny: a selective dynamic compiler for embedded Java virtual machine targeting ARM processors (MD, AM, NT), pp. 874–878.
- SAC-2005-HouD #analysis #design #detection #search-based
- Immunity-based intrusion detection system design, vulnerability analysis, and GENERTIA’s genetic arms race (HH, GVD), pp. 952–956.
- ICPR-v4-2004-YamamotoYS #gesture #interface #using
- Arm-Pointing Gesture Interface Using Surrounded Stereo Cameras System (YY, IY, KS), pp. 965–970.
- SAC-2004-AtasuBM #implementation #performance
- Efficient AES implementations for ARM based platforms (KA, LB, MM), pp. 841–845.
- LCTES-2004-BusSPCB #optimisation
- Link-time optimization of ARM binaries (BDB, BDS, LVP, DC, KDB), pp. 211–220.
- ICPR-v1-2002-DeverLS #automation #recognition #visual notation
- Automatic Visual Recognition of Armed Robbery (JD, NdVL, MS), pp. 451–455.
- LCTES-SCOPES-2002-KrishnaswamyG
- Profile guided selection of ARM and thumb instructions (AK, RG), pp. 56–64.
- TOOLS-USA-2001-Arsanjani01a #component #lifecycle
- Developing Component-Based Software: Arming Yourself for the Full Lifecycle (AA), p. 335.
- ICPR-v4-2000-SanchezM00a #behaviour #programming #using #visual notation
- Robot-Arm Pick and Place Behavior Programming System Using Visual Perception (AJS, JMM), pp. 4507–4510.
- LICS-1999-GottlobP #complexity #modelling
- Working with Arms: Complexity Results on Atomic Representations of Herbrand Models (GG, RP), pp. 306–315.
- ICPR-1996-BernardoGP #3d #implementation #realtime
- Monocular tracking of the human arm in 3D: real-time implementation and experiments (EDB, LG, PP), pp. 622–626.
- ICML-1995-SalganicoffU #learning #multi #using
- Active Exploration and Learning in real-Valued Spaces using Multi-Armed Bandit Allocation Indices (MS, LHU), pp. 480–487.
- AdaEurope-1994-WiggersO #ada
- Ada Controls the European Robotic Arm (JJMW, MJAO), pp. 322–332.
- PODS-1992-Rotem #analysis #scalability
- Analysis of Disk Arm Movement for Large Sequential Reads (DR), pp. 47–54.