Sciweavers

320 search results - page 51 / 64
» Recognizing Human Actions Using Key Poses
Sort
View
OZCHI
2005
ACM
15 years 3 months ago
Technology for the humdrum: trajectories, interactional needs and a care setting
We report on a care setting where staff looking after ex-psychiatric patients were supported by mobile and stationery communications technology (e.g. mobile phones, a messaging sy...
Connor Graham, Keith Cheverst, Mark Rouncefield
ICDE
2008
IEEE
182views Database» more  ICDE 2008»
15 years 11 months ago
Accurate and Efficient Inter-Transaction Dependency Tracking
A reparable database management system has the ability to automatically undo the set of transactions that are corrupted by a human error or malicious attack. The key technical chal...
Tzi-cker Chiueh, Shweta Bajpai
AGENTS
2001
Springer
15 years 2 months ago
A knowledge level software engineering methodology for agent oriented programming
Our goal in this paper is to introduce and motivatea methodology, called Tropos, for building agent oriented software systems. Tropos is based on two key ideas. First, the notion ...
Paolo Bresciani, Anna Perini, Paolo Giorgini, Faus...
RA
2003
135views Robotics» more  RA 2003»
14 years 11 months ago
Behavioural Cloning and Robot Control
Behavioural cloning is a method by which a machine learns control skills through observing what a human controller would do in a certain set of circumstances. More specifically, t...
Claire D'Este, Mark O'Sullivan, Nicholas Hannah
ECCV
2004
Springer
15 years 11 months ago
Image Clustering with Metric, Local Linear Structure, and Affine Symmetry
Abstract. This paper addresses the problem of clustering images of objects seen from different viewpoints. That is, given an unlabelled set of images of n objects, we seek an unsup...
Jongwoo Lim, Jeffrey Ho, Ming-Hsuan Yang, Kuang-Ch...