Sciweavers

702 search results - page 88 / 141
» Joint Kernel Maps
Sort
View
CTRSA
2010
Springer
172views Cryptology» more  CTRSA 2010»
16 years 8 days ago
Revisiting Higher-Order DPA Attacks:
Security devices are vulnerable to side-channel attacks that perform statistical analysis on data leaked from cryptographic computations. Higher-order (HO) attacks are a powerful a...
Benedikt Gierlichs, Lejla Batina, Bart Preneel, In...
IROS
2008
IEEE
250views Robotics» more  IROS 2008»
15 years 12 months ago
Centroidal Momentum Matrix of a humanoid robot: Structure and properties
— The centroidal momentum of a humanoid robot is the sum of the individual link momenta, after projecting each to the robot’s Center of Mass (CoM). Centroidal momentum is a lin...
David E. Orin, Ambarish Goswami
SMI
2008
IEEE
181views Image Analysis» more  SMI 2008»
15 years 12 months ago
Example based skeletonization using harmonic one-forms
This paper presents a method to extract skeletons using examples. Our method is based on the observation that many deformations in real world applications are isometric or near is...
Ying He 0001, Xian Xiao, Hock Soon Seah
IROS
2007
IEEE
171views Robotics» more  IROS 2007»
15 years 11 months ago
Learning full-body motions from monocular vision: dynamic imitation in a humanoid robot
— In an effort to ease the burden of programming motor commands for humanoid robots, a computer vision technique is developed for converting a monocular video sequence of human p...
Jeffrey B. Cole, David B. Grimes, Rajesh P. N. Rao
VTC
2006
IEEE
105views Communications» more  VTC 2006»
15 years 11 months ago
Iterative Equalization and Decoding for Unsynchronized OFDMA Uplink Transmissions
— For the uplink transmission of a coded OFDMA system, we present an iterative receiver that performs joint frequency offset acquisition, channel estimation and maximum a posteri...
Man-On Pun, Michele Morelli, C. C. Jay Kuo