Sciweavers

1050 search results - page 131 / 210
» Two methods of authenticated positioning
Sort
View
ISCAS
2008
IEEE
114views Hardware» more  ISCAS 2008»
15 years 8 months ago
Multimicrophone speech dereverberation using spatiotemporal and spectral processing
— Speech signals acquired in a reverberant room with microphones positioned at a distance from the talker are degraded in quality due to reverberation and measurement noise. Ther...
Nikolay D. Gaubitch, Emanuel A. P. Habets, Patrick...
126
Voted
WACV
2008
IEEE
15 years 8 months ago
Object Categorization Based on Kernel Principal Component Analysis of Visual Words
In recent years, many researchers are studying object categorization problem. It is reported that bag of keypoints approach which is based on local features without topological in...
Kazuhiro Hotta
136
Voted
WCRE
2008
IEEE
15 years 8 months ago
PREREQIR: Recovering Pre-Requirements via Cluster Analysis
High-level software artifacts, such as requirements, domain-specific requirements, and so on, are an important source of information that is often neglected during the reverse- an...
Jane Huffman Hayes, Giuliano Antoniol, Yann-Ga&eum...
IROS
2007
IEEE
167views Robotics» more  IROS 2007»
15 years 8 months ago
Path following control for tracked vehicles based on slip-compensating odometry
— Tracked vehicles have the advantage of stable locomotion on uneven terrain, and, as a result, such mechanisms are used for locomotion on outdoor robots, including those used fo...
Daisuke Endo, Yoshito Okada, Keiji Nagatani, Kazuy...
117
Voted
ICRA
2005
IEEE
124views Robotics» more  ICRA 2005»
15 years 7 months ago
Pattern Generation of Biped Walking Constrained on Parametric Surface
— This paper describes a generation method for spatially natural biped walking. By limiting the COG (Center of Gravity) motion space to a sculptured surface, the degree of freedo...
Mitsuharu Morisawa, Shuuji Kajita, Kenji Kaneko, K...