Visual schedules—the use of symbols to represent a series of activities or steps—have been successfully used by caregivers to help children with autism to understand, structur...
Sen H. Hirano, Michael T. Yeganyan, Gabriela Marcu...
The nature of the threats posed by Distributed Denial of Service (DDoS) attacks on large networks, such as the Internet, demands effective detection and response methods. These me...
Laura Feinstein, Dan Schnackenberg, Ravindra Balup...
The purpose of the current study was to test whether we could create a system where students can learn by teaching a live machine-learning agent. SimStudent is a computer agent tha...
Noboru Matsuda, Victoria Keiser, Rohan Raizada, Ga...
We introduce gesture controllers, a method for animating the body language of avatars engaged in live spoken conversation. A gesture controller is an optimal-policy controller tha...
Sergey Levine, Philipp Krähenbühl, Sebastian Thr...
The idea of ubiquitous computing and smart environments is no longer a dream and has long become a serious area of research and soon this technology will start entering our every d...