Sciweavers

2287 search results - page 242 / 458
» Making it Real
Sort
View
ICON
2007
IEEE
15 years 10 months ago
An Empirical Evaluation of IP Time To Live Covert Channels
—Communication is not necessarily made secure by the use of encryption alone. The mere existence of communication is often enough to raise suspicion and trigger investigative act...
Sebastian Zander, Grenville J. Armitage, Philip Br...
135
Voted
IROS
2007
IEEE
157views Robotics» more  IROS 2007»
15 years 10 months ago
Autonomous blimp control using model-free reinforcement learning in a continuous state and action space
— In this paper, we present an approach that applies the reinforcement learning principle to the problem of learning height control policies for aerial blimps. In contrast to pre...
Axel Rottmann, Christian Plagemann, Peter Hilgers,...
ISCA
2007
IEEE
114views Hardware» more  ISCA 2007»
15 years 10 months ago
Mechanisms for bounding vulnerabilities of processor structures
Concern for the increasing susceptibility of processor structures to transient errors has led to several recent research efforts that propose architectural techniques to enhance r...
Niranjan Soundararajan, Angshuman Parashar, Anand ...
ISMAR
2007
IEEE
15 years 10 months ago
Evaluating Display Types for AR Selection and Annotation
This paper evaluates different display devices for selection or annotation tasks in augmented reality (AR). We compare three different display types – a head mounted display and...
Jason Wither, Stephen DiVerdi, Tobias Höllere...
ROMAN
2007
IEEE
181views Robotics» more  ROMAN 2007»
15 years 10 months ago
Efficient Articulated Model Fitting on a Single Image or a Sequence
Abstract—Models that can efficiently, compactly, and semantically represent potential users are important tools for human-robot interaction applications. We model a person as a p...
Matheen Siddiqui, Gérard G. Medioni