In this work we present a new technique of facial-image retrieval using constrained independent component analysis (cICA). We have employed cICA for the online extraction of those...
— Libraries of trajectories are a promising way of creating policies for difficult problems. However, often it is not desirable or even possible to create a new library for ever...
Martin Stolle, Hanns Tappeiner, Joel E. Chestnutt,...
Among the variety of alignment approaches (e.g., using machine learning, subsumption computation, formal concept analysis, etc.) similarity-based ones rely on a quantitative asses...
We propose a new cryptographic technique, Acknowledgment Compression, permitting senders of multicast data to verify that all interested parties have either received the data or l...
The idea of using computer-based surgical simulators for training of prospective surgeons has been a topic of research for more than a decade. However, surgical simulation is still...
Raimundo Sierra, Michael Bajka, Celalettin Karadog...