Sciweavers

988 search results - page 85 / 198
» Positive Results and Techniques for Obfuscation
Sort
View
PERVASIVE
2004
Springer
15 years 3 months ago
Recognizing Workshop Activity Using Body Worn Microphones and Accelerometers
Most gesture recognition systems analyze gestures intended for communication (e.g. sign language) or for command (e.g. navigation in a virtual world). We attempt instead to recogn...
Paul Lukowicz, Jamie A. Ward, Holger Junker, Mathi...
ICDAR
2003
IEEE
15 years 3 months ago
Visualizing Multimedia Content on Paper Documents: Components of Key Frame Selection for Video Paper
The components of a key frame selection algorithm for a paper-based multimedia browsing interface called Video Paper are described. Analysis of video image frames is combined with...
Jonathan J. Hull, Berna Erol, Jamey Graham, Dar-Sh...
ICRA
2003
IEEE
103views Robotics» more  ICRA 2003»
15 years 3 months ago
On addressing the run-cost variance in randomized motion planners
The decades of research in motion planning have resulted in numerous algorithms. Many of the most successful algorithms are randomized and can have widely differing run-times for ...
Pekka Isto, Martti Mäntylä, Juha O. Tuom...
RTAS
2003
IEEE
15 years 3 months ago
Real-Time Scheduling of Hierarchical Reward-Based Tasks
A reward-based task typically consists of a mandatory part that must be accomplished before the given deadline, and an optional part that is associated with rewards for partial co...
Ming Zu, Albert Mo Kim Cheng
ICRA
2000
IEEE
150views Robotics» more  ICRA 2000»
15 years 2 months ago
Path Planning in Image Space for Robust Visual Servoing
Vision feedback control loop techniques are efficient for a great class of applications but they come up against difficulties when the initial and desired positions of the camer...
Youcef Mezouar, François Chaumette