Sciweavers

127 search results - page 13 / 26
» Enhancing input device evaluation: longitudinal approaches
Sort
View
GFKL
2005
Springer
117views Data Mining» more  GFKL 2005»
15 years 3 months ago
A Cross-cultural Evaluation Framework for Behavioral Biometric User Authentication
Today biometric techniques are based either on passive (e.g. IrisScan, Face) or active methods (e.g. voice and handwriting). In our work we focus on evaluation of the latter. These...
Franziska Wolf, T. K. Basu, Pranab K. Dutta, Claus...
66
Voted
ICCV
2009
IEEE
16 years 2 months ago
Image Restoration using Online Photo Collections
We present an image restoration method that leverages a large database of images gathered from the web. Given an input image, we execute an efficient visual search to find the c...
Kevin Dale, Micah K. Johnson, Kalyan Sunkavalli, W...
ICRA
2008
IEEE
160views Robotics» more  ICRA 2008»
15 years 4 months ago
A constrained optimization approach to virtual fixtures for multi-handed tasks
— In this work, we have extended the concept of constrained motion control of robots to surgical tasks that require multiple robots. We present virtual fixtures to guide the mot...
Ankur Kapoor, Russell H. Taylor
ICIA
2007
14 years 12 months ago
Intent Recognition for Human-Robot Interaction
Effective human-robot cooperation requires robotic devices that understand human goals and intentions. We frame the problem of intent recognition as one of tracking and predicting...
Andreas G. Hofmann, Brian C. Williams
80
Voted
DAC
2008
ACM
15 years 10 months ago
Cache modeling in probabilistic execution time analysis
Multimedia-dominated consumer electronics devices (such as cellular phone, digital camera, etc.) operate under soft real-time constraints. Overly pessimistic worst-case execution ...
Yun Liang, Tulika Mitra