Security devices are vulnerable to side-channel attacks that perform statistical analysis on data leaked from cryptographic computations. Higher-order (HO) attacks are a powerful a...
— The centroidal momentum of a humanoid robot is the sum of the individual link momenta, after projecting each to the robot’s Center of Mass (CoM). Centroidal momentum is a lin...
This paper presents a method to extract skeletons using examples. Our method is based on the observation that many deformations in real world applications are isometric or near is...
— In an effort to ease the burden of programming motor commands for humanoid robots, a computer vision technique is developed for converting a monocular video sequence of human p...
Jeffrey B. Cole, David B. Grimes, Rajesh P. N. Rao
— For the uplink transmission of a coded OFDMA system, we present an iterative receiver that performs joint frequency offset acquisition, channel estimation and maximum a posteri...