Sciweavers

225 search results - page 42 / 45
» From manipulation to communicative gesture
Sort
View
TOG
2012
232views Communications» more  TOG 2012»
11 years 10 months ago
Discovery of complex behaviors through contact-invariant optimization
We present a motion synthesis framework capable of producing a wide variety of important human behaviors that have rarely been studied, including getting up from the ground, crawl...
Igor Mordatch, Emanuel Todorov, Zoran Popovic
TOG
2012
258views Communications» more  TOG 2012»
11 years 10 months ago
Stitch meshes for modeling knitted clothing with yarn-level detail
ike abstraction of the yarn model; (c) then, we specify the desired knitting pattern over the stitch mesh’s surface. (d) Following the interactive modeling process, the model goe...
Cem Yuksel, Jonathan M. Kaldor, Doug L. James, Ste...
IMC
2009
ACM
14 years 2 months ago
ANTIDOTE: understanding and defending against poisoning of anomaly detectors
Statistical machine learning techniques have recently garnered increased popularity as a means to improve network design and security. For intrusion detection, such methods build ...
Benjamin I. P. Rubinstein, Blaine Nelson, Ling Hua...
ICRA
2006
IEEE
117views Robotics» more  ICRA 2006»
14 years 1 months ago
A Neurally Controlled Robot Competes and Cooperates with Humans in Segway Soccer
— A new RoboCup soccer league is being developed, focusing on human-robot interaction. In this league each team consists of both a human player, mounted on a Segway HT scooter, a...
Jason Fleischer, Botond Szatmáry, Donald Hu...
COLCOM
2007
IEEE
14 years 1 months ago
Cooperative security in distributed sensor networks
— Distributed sensor network protocols, such as routing, time synchronization or data aggregation protocols make use of collaborative techniques to minimize the consumption of sc...
Oscar García Morchon, Heribert Baldus, Tobi...