Abstract. I review theories and research on the cognitive processing of environmental distance information by humans, particularly that acquired via direct experience in the enviro...
Most face recognition algorithms use a “distancebased” approach: gallery and probe images are projected into a low dimensional feature space and decisions about matching are b...
The literature agrees that the major threat to IS security is constituted by careless employees who do not comply with organizations’ IS security policies and procedures. To add...
— Efficient, reliable and flexible handling is still very challenging in micromanipulation and micro-assembly. In this paper, we propose an original thermally actuated gripper b...
— We describe a system that provides a low-cost, portable control station for experimentation in mobile robotic telesurgery. The software and hardware implementation of our syste...
Ganesh Sankaranarayanan, Hawkeye H. I. King, Seong...