—Speaking using unconstrained natural language is an intuitive and flexible way for humans to interact with robots. Understanding this kind of linguistic input is challenging be...
Thomas Kollar, Stefanie Tellex, Deb Roy, Nicholas ...
—Several security protocols require a human to compare two hash values to ensure successful completion. When the hash values are represented as long sequences of numbers, humans ...
The aim of this study was to examine how users perceive help on a mobile device with respect to the presentation format and the severity of the scenario the user encounters. We ex...
Traditionally, human facial expressions have been studied using either 2D static images or 2D video sequences. The 2D-based analysis is incapable of handing large pose variations....
Lijun Yin, Xiaozhou Wei, Yi Sun, Jun Wang, Matthew...
Handheld computing devices are becoming highly connected devices with high capacity storage. This has resulted in their being able to support storage of, and access to, personal p...
Cathal Gurrin, Gareth J. F. Jones, Hyowon Lee, Nei...