We believe this paper is the first extensive user-study of whitelisting email addresses. While whitelists are common in social networking and instant messaging (e.g., buddylists),...
The Cranfield evaluation method has some disadvantages, including its high cost in labor and inadequacy for evaluating interactive retrieval techniques. As a very promising alter...
— In this paper we consider a single hand-held camera performing SLAM at video rate with generic 6DOF motion. The aim is to optimise both the localisation of the sensor and build...
Teresa Vidal-Calleja, Andrew J. Davison, Juan Andr...
Abstract— In this paper, we present an algorithm for autonomous stair climbing with a tracked vehicle. The proposed method achieves robust performance under real-world conditions...
Anastasios I. Mourikis, Nikolas Trawny, Stergios I...
This paper introduces an algorithm that estimates the speed of a mobile phone by matching time-series signal strength data to a known signal strength trace from the same road. Kno...
Gayathri Chandrasekaran, Tam Vu, Alexander Varshav...