46 results on '"G. Rose"'
Search Results
2. Tri-Modal Intervention for Diabetic Peripheral Neuropathy: Pilot Study.
3. A Novel Velocity-Based Controller to Avoid Synergistic Movement After Stroke.
4. Essential Tremor Severity Classification Using a Multi-Layer Perceptron and the TETRAS Scale.
5. Neuromechanical Model-free Epistemic Risk Guided Exploration (NeuroMERGE) for Safe Autonomy in Human-Robot Interaction.
6. NeuroGAIN: Neuromechanical Generative Demand Forecasting Toward Optimal Control of Soft Hand Exoskeletons.
7. Towards a Path Planning and Communication Framework for Seamless Human-Robot Assembly.
8. Towards Automatic Extraction of Product and Process Data for Human-Robot Collaborative Assembly.
9. Impact of Gravity Compensation on Upper Extremity Movements in Harmony Exoskeleton.
10. Towards a conceptual safety planning framework for human-robot collaboration.
11. An Anthropomorphic Passive Instrumented Hand for Validating Wearable Robotic Systems.
12. Design and Validation of a Novel Exoskeleton Hand Interface: The Eminence Grip.
13. Estimating the Effect of Robotic Intervention on Elbow Joint Motion.
14. Exploring the Capabilities of Harmony for Upper-Limb Stroke Therapy.
15. Estimating anatomical wrist joint motion with a robotic exoskeleton.
16. Design and characterization of the OpenWrist: A robotic wrist exoskeleton for coordinated hand-wrist rehabilitation.
17. Maintaining subject engagement during robotic rehabilitation with a minimal assist-as-needed (mAAN) controller.
18. Modeling Basic Aspects of Cyber-Physical Systems, Part II (Extended Abstract).
19. Design and characterization of a haptic paddle for dynamics education.
20. System characterization of RiceWrist-S: A forearm-wrist exoskeleton for upper extremity rehabilitation.
21. Frontier in binary intuitionistic topology
22. Rewriting Variables: The Complexity of Fast Algebraic Attacks on Stream Ciphers.
23. Turing: A Fast Stream Cipher.
24. On binary intuitionistic points and intuitionistic neighborhood structures.
25. Guess-and-Determine Attacks on SNOW.
26. Voice activity detection in noisy environments.
27. A Practical Cryptanalysis of SSC2.
28. Exploiting Multiples of the Connection Polynomial in Word-Oriented Stream Ciphers.
29. ssmail: Opportunistic Encryption in sendmail.
30. A Stream Cipher Based on Linear Feedback over GF(28).
31. A Similarity-Based Agent for Internet Searching.
32. Extracting Conceptual Knowledge From Text Using Explicit Relation Markers.
33. The PGP Moose - Implementation and Experience.
34. Semantic analysis for large vocabulary cursive script recognition.
35. Share Scheduling Mechanism.
36. Design and Primitive Specification for Shannon.
37. Security/Cryptography.
38. PKI/Cryptography.
39. PKI/Cryptography.
40. Where Has All the Crypto Gone? Long Time Coming: A Speculative and Historical Talk.
41. Haptic paddle for dynamics education.
42. The Effects of Corpus Size and Homogeneity on Language Model Quality.
43. Text Recognition and Collocations and Domain Codes.
44. OS-3: the Oregon State open shop operating system.
45. A characterization of the classes L1 and R1 of primitive recursive wordfunctions.
46. Recent study of teaching: machine aids in rehabilitation therapy.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.