Author of the publication

A constraints-based method of the inverse kinematics for redundant manipulators.

, , , and . IROS, page 531-538. IEEE, (1994)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Utilizing Transformer Deep Learning Based Outlier Detection to Screen Out Reliability Weak ICs., , , , , , , , , and 5 other author(s). IRPS, page 1-5. IEEE, (2024)An Interior-Point Method for Large-Scale $l_1$-Regularized Least Squares, , , , and . IEEE Journal of Selected Topics in Signal Processing, 1 (4): 606--617 (2008)$l_1 $ trend filtering, , , and . SIAM Review, 51 (2): 339--360 (2009)Security Governance: Its Impact on Security Culture., , , and . AISM, page 47-58. School of Computer and Information Science, Edith Cowan University, Western Australia, (2005)A constraints-based method of the inverse kinematics for redundant manipulators., , , and . IROS, page 531-538. IEEE, (1994)Segmentation of Kidney Cortex in MRI Studies using a Constrained Morphological 3D H-maxima Transform., , , and . ICARCV, page 1-5. IEEE, (2006)Session 6 - RF and millimeter-wave power amplifiers and transmitters., and . CICC, page 1. IEEE, (2017)SRDTP: A reliable datagram transport protocol for distributed computing., , and . Comput. Commun., 16 (4): 241-250 (1993)An iterative algorithm for pole placement by output feedback., , and . IEEE Trans. Autom. Control., 39 (3): 565-568 (1994)A Taxonomy of Issues in Name Systems Design and Implementation, , and . SIGOPS Oper. Syst. Rev., 27 (3): 4--18 (1993)