This paper examines high dimensional regression with noise-contaminated input and output data. Goals of such learning problems include optimal prediction with noiseless query poin...
—Program obfuscation is often employed by malware in order to avoid detection by anti-virus software, but it has many other legitimate uses, such as copy protection, software lic...
Abstract-Multi-detect (N-detect) testing suffers from the drawback that its test length grows linearly with N. We present a new method to generate compact test sets that provide hi...
—Although fall is a rare event in the life of a humanoid robot, we must be prepared for it because its consequences are serious. In this paper we present a fall strategy which ra...
—Robust localization of robots and reliable tracking of people are both critical requirements for the deployment of service robots in real-world environments. In crowded public s...
Dylan F. Glas, Takayuki Kanda, Hiroshi Ishiguro, N...