Author of the publication

Multi-level constraints of redundant manipulator handled by different trajectory tracking.

, , , and . ROBIO, page 2006-2011. IEEE, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analyzing In-Memory Hash Join: Granularity Matters., , , and . ADMS@VLDB, page 18-25. (2017)Development of machine learning algorithms for predicting internal corrosion of crude oil and natural gas pipelines., , , , and . Comput. Chem. Eng., (September 2023)TCP-Peach++: Enhancement of TCP-Peach+ for Satellite IP Networks with Asymmetrical Bandwidth and Persistent Fades (Invited Paper)., and . ISCIS, volume 3733 of Lecture Notes in Computer Science, page 145-151. Springer, (2005)Multi-level constraints of redundant manipulator handled by different trajectory tracking., , , and . ROBIO, page 2006-2011. IEEE, (2014)Single-shot Brillouin optical time domain analysis for distributed fiber sensing., , and . IEEE SENSORS, page 1-3. IEEE, (2016)Early fault detection method for distribution lines based on multi-scale wavelet transform and deep neural network., , , , , and . iSPEC, page 1-6. IEEE, (2023)Exploring LoRa for Drone Detection., , , , , and . INFOCOM Workshops, page 1-2. IEEE, (2022)LoRa-based Outdoor 3D Localization., , , and . INFOCOM Workshops, page 1-2. IEEE, (2022)An Improved MPB-CNN Segmentation Method for Edema Area and Neurosensory Retinal Detachment in SD-OCT Images., , , , and . OMIA@MICCAI, volume 11855 of Lecture Notes in Computer Science, page 130-138. Springer, (2019)Perimeter Intrusion Detection with Backscattering Enhanced Fiber Using Telecom Cables as Sensing Backhaul., , , , , , , , , and 4 other author(s). OFC, page 1-3. IEEE, (2022)