This paper recounts some lessons that we learned from the deployment of host-to-host IPsec in a large corporate network. Several security issues arise from mismatches between the d...
This paper presents a system which learns from examples to automatically recognize people and estimate their poses in image sequences with the potential application to daily surve...
: It is known that graphic interfaces using electromyogram (EMG) generated by wrist motion are a potentially viable for a wearable computer. However, these interface prototypes see...
Mobile phone can serve as powerful tool for world-wide communication. A system is developed to remotely monitor process through spoken commands using mobile. Mel cepstrum features ...
Naresh P. Jawarkar, Vasif Ahmed, Siddharth A. Ladh...
This paper describes an approach to surface identification in the context of mobile robotics, applicable to supervised and unsupervised learning. The identification is based on ana...