Author of the publication

Bordered Matrix for Singularity Robust Inverse Kinematics: A Methodological Aspect.

, , and . ICRA, page 3013-3019. IEEE, (2000)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Studies on Horizontal Competition among Homogenous Retailers Based on Agent-based Approach., and . ICEB, page 158-163. Academic Publishers/World Publishing Corporation, (2004)Engineering Pathway for User Personal Knowledge Recommendation., , , , , and . WAIM, volume 7418 of Lecture Notes in Computer Science, page 459-470. Springer, (2012)Image guide planning and control of flying vehicle., and . ICARCV, page 372-377. IEEE, (2002)Solving the Sparsity Problem in Recommender Systems Using Association Retrieval., , , and . J. Comput., 6 (9): 1896-1902 (2011)Dynamic anonymous identity authentication (DAIA) scheme for VANET., , , , and . Int. J. Commun. Syst., (2019)External validation measures for K-means clustering: A data distribution perspective., , , and . Expert Syst. Appl., 36 (3): 6050-6061 (2009)Align, Perturb and Decouple: Toward Better Leverage of Difference Information for RSI Change Detection., , , , , , and . IJCAI, page 1497-1505. ijcai.org, (2023)Network attack detection method for power system terminal based on improved random forest., , , , , and . ICAIIS, page 85:1-85:6. ACM, (2021)Elastic Resource Allocation in the Cloud., , , , and . CSE, page 1338-1342. IEEE Computer Society, (2013)A Technique of Mathematical Expression Structure Analysis for the Handwriting Input System., , , , and . ICDAR, page 131-134. IEEE Computer Society, (1999)