Personensuche
X
?
2022 IEEE 6th Conference on Energy Internet and Energy System Integration (EI2) ,
1
Tie-Line Scheduling Based on Equivalents of Regional Power ..:
, In:
?
2022 IEEE International Conference on Industrial Technology (ICIT) ,
2
Virtual Reality Image Dataset vCAT Helps Research on Semant..:
, In:
?
2022 5th International Conference on Artificial Intelligence and Big Data (ICAIBD) ,
3
Forgery Face Image Detection Based on Improved Capsule Netw..:
, In:
?
Advances in Hydroinformatics; Springer Water ,
4
Study on Forecasting and Alarming Model of Flash Flood Base..:
, In:
?
Intelligent Robotics and Applications; Lecture Notes in Computer Science ,
5
Modeling of Passive Dynamic Walking Behavior of the Asymmet..:
, In:
?
2021 IEEE International Conference on Robotics and Biomimetics (ROBIO) ,
6
Towards a more practical data-driven biped walking control:
, In:
?
Intelligent Robotics and Applications; Lecture Notes in Computer Science ,
7
Research on Passive Energy-Regulated Bionic Shell for Later..:
, In:
?
2021 IEEE International Conference on Robotics and Biomimetics (ROBIO) ,
8
Analysis on Ride Comfort of a Novel Eight Wheel Vehicle:
, In:
?
2020 IEEE International Conference on Mechatronics and Automation (ICMA) ,
9
Continuity and Smoothness Analysis and Possible Improvement..:
, In:
?
Proceedings of the 2019 IEEE/ACM International Symposium on Code Generation and Optimization ,
10
White-box program tuning:
, In:
?
2019 IEEE International Conference on Robotics and Biomimetics (ROBIO) ,
11
Practical Vision-Based Walking Navigation for the Humanoid ..:
, In:
?
2019 IEEE International Conference on Robotics and Biomimetics (ROBIO) ,
12
Gait Analysis of the Mammal Quadruped Robot from the Perspe..:
, In:
?
Proceedings of the 40th ACM SIGPLAN Conference on Programming Language Design and Implementation ,
13
Programming support for autonomizing software:
, In:
?
2019 IEEE International Conference on Mechatronics and Automation (ICMA) ,
14
Practical Kicking Motion Generation Method for NAO:
, In:
?
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security ,
15