Sciweavers

1625 search results - page 125 / 325
» Intentionality
Sort
View
ICRA
2005
IEEE
119views Robotics» more  ICRA 2005»
14 years 3 months ago
Fuzzy Enhanced Control of an Underactuated Finger Using Tactile and Position Sensors
— This paper proposes a control scheme dedicated to underactuated fingers with the intention of maximizing the capabilities of the latter using tactile and position information ...
Lionel Birglen, Clément Gosselin
ISCAS
2005
IEEE
133views Hardware» more  ISCAS 2005»
14 years 3 months ago
Sub-sequence video coding for improved temporal scalability
—Compression efficiency and bitrate scalability are among the key factors in video coding. The paper introduces novel sub-sequence coding techniques for temporal scalability. The...
Dong Tian, Miska M. Hannuksela, Moncef Gabbouj
SP
2005
IEEE
131views Security Privacy» more  SP 2005»
14 years 3 months ago
Semantics-Aware Malware Detection
A malware detector is a system that attempts to determine whether a program has malicious intent. In order to evade detection, malware writers (hackers) frequently use obfuscation...
Mihai Christodorescu, Somesh Jha, Sanjit A. Seshia...
MM
2005
ACM
109views Multimedia» more  MM 2005»
14 years 3 months ago
Seven mile boots: implications of an everyday interface
With seven-league boots through the Internet - when you take a stroll through the physical world in this wireless LAN footwear, you might meet people who happen to be spending som...
Martin Pichlmair
ICIC
2005
Springer
14 years 3 months ago
Automatic Construction of Bayesian Networks for Conversational Agent
Abstract. As the information in the internet proliferates, the methods for effectively providing the information have been exploited, especially in conversational agents. Bayesian ...
Sungsoo Lim, Sung-Bae Cho