Sciweavers

545 search results - page 94 / 109
» An algorithm for amplitude-constrained input design for syst...
Sort
View
ICMI
2004
Springer
281views Biometrics» more  ICMI 2004»
14 years 1 months ago
Articulatory features for robust visual speech recognition
Visual information has been shown to improve the performance of speech recognition systems in noisy acoustic environments. However, most audio-visual speech recognizers rely on a ...
Kate Saenko, Trevor Darrell, James R. Glass
HHCI
2000
14 years 2 days ago
Hand-Shaped Force Interface for Human-Cooperative Mobile Robot
Aiming at realization of direct and intuitive cooperation between human and robot, we propose an interface system for a two-wheeled, autonomous mobile robot that can take physical...
Riku Hikiji, Shuji Hashimoto
CHI
2003
ACM
14 years 8 months ago
Shorthand writing on stylus keyboard
We propose a method for computer-based speed writing, SHARK (shorthand aided rapid keyboarding), which augments stylus keyboarding with shorthand gesturing. SHARK defines a shorth...
Shumin Zhai, Per Ola Kristensson
ICRA
2009
IEEE
165views Robotics» more  ICRA 2009»
14 years 3 months ago
Robust servo-control for underwater robots using banks of visual filters
—We present an application of machine learning to the semi-automatic synthesis of robust servo-trackers for underwater robotics. In particular, we investigate an approach based o...
Junaed Sattar, Gregory Dudek
CHES
2007
Springer
157views Cryptology» more  CHES 2007»
14 years 2 months ago
A Hardware-Assisted Realtime Attack on A5/2 Without Precomputations
Abstract. A5/2 is a synchronous stream cipher that is used for protecting GSM communication. Recently, some powerful attacks [2,10] on A5/2 have been proposed. In this contribution...
Andrey Bogdanov, Thomas Eisenbarth, Andy Rupp