نتایج جستجو برای: scale manipulation

تعداد نتایج: 635538  

2012
Owen Paul Watson David S. Touretzky

Calliope is an open source mobile robot designed in the Tekkotsu Lab at Carnegie Mellon University in collaboration with RoPro Design, Inc. The Calliope5SP model features an iRobot Create base, an ASUS netbook, a 5-degree of freedom arm with a gripper with two independently controllable fingers, and a Sony PlayStation Eye camera and Robotis AX-S1 IR rangefinder on a pan/tilt mount. We use chess...

2014
Martin Sinclair Ioannis A. Raptis

The field of Large-Scale Actuator Networks (LSANs) is a class of cyber-physical systems that is growing rapidly. One key application of LSANs is distributed manipulation. Distributed manipulation is a revolutionary application of this technology in the industrial sector. Examples of distributed manipulation include: vibrating plates, arrays of air jets, and mobile multi-robot teams. This paper ...

2017

Roya Ensafi is a Research Assistant Professor in Computer Science and Engineering at the University of Michigan, where her research focuses on computer networking and security. She pioneered the use of side-channels to remotely measure network interference and censorship of Internet traffic. Prior to joining Michigan, she was a postdoc at Princeton University. [email protected] Despite the perva...

2008
A.H.J. Yang S. D. Moore B. S. Schmidt M. Lipson D. Erickson

Optofluidic transport represents the fusion of optics with microfluidics to create a new paradigm for nanoscale transport. Optofluidic transport exploits the favorable transport properties of light for the manipulation of objects in nanoscale systems. Here we demonstrate, for the first time, trapping and confinement of dielectric nanoparticles (75 and 100 nm polystyrene nanoparticle beads) usin...

Journal: :Proceedings on Privacy Enhancing Technologies 2023

DNS manipulation is an increasingly common technique used by censors and other network adversaries to prevent users from accessing restricted Internet resources hijack their connections. Prior work in detecting relies largely on comparing resolutions with trusted control results identify inconsistencies. However, the emergence of CDNs cloud providers practicing content localization load balanci...

Journal: :Proceedings of the National Academy of Sciences 2018

2002
COLIN M. MACLEOD ROSS A. JACKSON JOHN PALMER

Field dependence and spatial ability are widely thought of as distinct psychological dimensions. We sought to evaluate the alternative hypothesis that these are, in fact, different labels for a common underlying dimension. A sample of 60 subjects was selected on the basis of scores on a test of spatial ability. These subjects completed two tests of field dependence--the Embedded Figures Test an...

2002
Alexis Paljic Sabine Coquillart Jean-Marie Burkhardt Paul Richard

Virtual environments such as the Responsive WorkbenchTM1 allow the close manipulation of virtual objects. We define close manipulation as either direct manipulation or manipulation at a relatively small distance. This paper reports on two studies on close manipulation using the Responsive Workbench. The first study investigates the influence of manipulation distance on performance in a 3D locat...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید