Skip to main content

Showing 1–5 of 5 results for author: da Silva, L C

  1. arXiv:2405.01925  [pdf, other

    cs.RO

    A Modular, Tendon Driven Variable Stiffness Manipulator with Internal Routing for Improved Stability and Increased Payload Capacity

    Authors: Kyle L. Walker, Alix J. Partridge, Hsing-Yu Chen, Rahul R. Ramachandran, Adam A. Stokes, Kenjiro Tadakuma, Lucas Cruz da Silva, Francesco Giorgio-Serchi

    Abstract: Stability and reliable operation under a spectrum of environmental conditions is still an open challenge for soft and continuum style manipulators. The inability to carry sufficient load and effectively reject external disturbances are two drawbacks which limit the scale of continuum designs, preventing widespread adoption of this technology. To tackle these problems, this work details the design… ▽ More

    Submitted 3 May, 2024; originally announced May 2024.

    Comments: To be presented at ICRA 2024, Yokohama, Japan. 6 pages

  2. arXiv:2105.12092  [pdf, other

    cs.AI cs.LG stat.ML

    Trajectory Modeling via Random Utility Inverse Reinforcement Learning

    Authors: Anselmo R. Pitombeira-Neto, Helano P. Santos, Ticiana L. Coelho da Silva, José Antonio F. de Macedo

    Abstract: We consider the problem of modeling trajectories of drivers in a road network from the perspective of inverse reinforcement learning. Cars are detected by sensors placed on sparsely distributed points on the street network of a city. As rational agents, drivers are trying to maximize some reward function unknown to an external observer. We apply the concept of random utility from econometrics to m… ▽ More

    Submitted 10 January, 2023; v1 submitted 25 May, 2021; originally announced May 2021.

    Comments: 31 pages; expanded version, with the addition of proofs not present in the first version

  3. arXiv:2004.05958  [pdf, other

    stat.ML cs.LG

    Anomaly Detection in Trajectory Data with Normalizing Flows

    Authors: Madson L. D. Dias, César Lincoln C. Mattos, Ticiana L. C. da Silva, José Antônio F. de Macedo, Wellington C. P. Silva

    Abstract: The task of detecting anomalous data patterns is as important in practical applications as challenging. In the context of spatial data, recognition of unexpected trajectories brings additional difficulties, such as high dimensionality and varying pattern lengths. We aim to tackle such a problem from a probability density estimation point of view, since it provides an unsupervised procedure to iden… ▽ More

    Submitted 13 April, 2020; originally announced April 2020.

    Comments: Accepted as a conference paper at 2020 International Joint Conference on Neural Networks (IJCNN 2020), part of 2020 IEEE World Congress on Computational Intelligence (IEEE WCCI 2020)

  4. arXiv:1706.01577  [pdf, ps, other

    math.DG cs.CG

    Characterization of Spherical and Plane Curves Using Rotation Minimizing Frames

    Authors: Luiz C. B. da Silva

    Abstract: In this work, we study plane and spherical curves in Euclidean and Lorentz-Minkowski 3-spaces by employing rotation minimizing (RM) frames. By conveniently writing the curvature and torsion for a curve on a sphere, we show how to find the angle between the principal normal and an RM vector field for spherical curves. Later, we characterize plane and spherical curves as curves whose position vector… ▽ More

    Submitted 21 September, 2022; v1 submitted 5 June, 2017; originally announced June 2017.

    Comments: 6 pages. Keywords: Rotation minimizing frame, spherical curve, plane curve, Bertrand curve, slant helix, general helix

    MSC Class: 53A04; 53A55; 53B99

    Journal ref: Bol. Soc. Paran. Mat. (2021)

  5. arXiv:1303.6782  [pdf

    cs.CR

    Systematic Mapping Study On Security Threats in Cloud Computing

    Authors: Carlo Marcelo Revoredo da Silva, Jose Lutiano Costa da Silva, Ricardo Batista Rodrigues, Leandro Marques do Nascimento, Vinicius Cardoso Garcia

    Abstract: Today, Cloud Computing is rising strongly, presenting itself to the market by its main service models, known as IaaS, PaaS and SaaS, that offer advantages in operational investments by means of on-demand costs, where consumers pay by resources used. In face of this growth, security threats also rise, compromising the Confidentiality, Integrity and Availability of the services provided. Our work is… ▽ More

    Submitted 27 March, 2013; originally announced March 2013.

    Comments: 10 pages

    Journal ref: (IJCSIS) International Journal of Computer Science and Information Security, Vol. 11, No. 3, March 2013