At its core is the Prove ID, a cryptographically-rooted identity that updates in real time as users change devices or telecom providers.
Abstract: In robotics field, safety is an extensively researched subject. This article proposes an approach, which is based on high-order control barrier functions (HOCBFs) and computed torque control ...
Abstract: For inverse synthetic aperture radar (ISAR) imaging of a maneuvering target, the Doppler frequency shift for the received signal in a range bin is time varying. In this letter, the received ...
This is a textbook for an introductory combinatorics course lasting one or two semesters. An extensive list of problems, ranging from routine exercises to research questions, is included. In each ...
There was an error while loading. Please reload this page.
This list focuses on understanding the internal mechanism of large language models (LLM). Works in this list are accepted by top conferences (e.g. ICML, NeurIPS, ICLR, ACL, EMNLP, NAACL), or written ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results