We propose an adaptive transmission technique for optical wireless (OW) systems, operating in atmospheric turbulence and employing subcarrier phase shift keying (S-PSK) intensity m...
Nestor D. Chatzidiamantis, Athanasios S. Lioumpas,...
Abstract. The verification performance of biometric systems is normally evaluated using the receiver operating characteristic (ROC) or detection error trade-off (DET) curve. We p...
Simultaneous teleoperation of mobile, social robots presents unique challenges, combining the real-time demands of conversation with the prioritized scheduling of navigational tas...
Dylan F. Glas, Takayuki Kanda, Hiroshi Ishiguro, N...
Text-based passwords are the most common mechanism for authenticating humans to computer systems. To prevent users from picking passwords that are too easy for an adversary to gue...
Saranga Komanduri, Richard Shay, Patrick Gage Kell...
Many of today's CBR systems are passive in nature: they require human users to activate them manually and to provide information about the incoming problem explicitly. In this...