Sciweavers

5722 search results - page 956 / 1145
» Security Function Interactions
Sort
View
127
Voted
IPPS
2009
IEEE
15 years 10 months ago
Adaptative clustering Particle Swarm Optimization
—The performance of Particle Swarm Optimization (PSO) algorithms depends strongly upon the interaction among the particles. The existing communication topologies for PSO (e.g. st...
Salomão S. Madeiro, Carmelo J. A. Bastos Fi...
IROS
2009
IEEE
152views Robotics» more  IROS 2009»
15 years 10 months ago
EMG-to-force estimation with full-scale physiology based muscle model
— EMG-to-force estimation for voluntary muscle contraction has many applications in human-machine interaction, motion analysis, and rehabilitation robotics for prosthetic limbs o...
Mitsuhiro Hayashibe, David Guiraud, Philippe Poign...
159
Voted
ACCV
2009
Springer
15 years 10 months ago
Iterated Graph Cuts for Image Segmentation
Graph cuts based interactive segmentation has become very popular over the last decade. In standard graph cuts, the extraction of foreground object in a complex background often le...
Bo Peng, Lei Zhang, Jian Yang
ATAL
2009
Springer
15 years 10 months ago
Learning a model of speaker head nods using gesture corpora
During face-to-face conversation, the speaker’s head is continually in motion. These movements serve a variety of important communicative functions. Our goal is to develop a mod...
Jina Lee, Stacy Marsella
ATAL
2009
Springer
15 years 10 months ago
MABLE: a framework for learning from natural instruction
The Modular Architecture for Bootstrapped Learning Experiments (MABLE) is a system that is being developed to allow humans to teach computers in the most natural manner possible: ...
Roger Mailler, Daniel Bryce, Jiaying Shen, Ciaran ...