Sciweavers

3280 search results - page 581 / 656
» MiTAP for real users, real data, real problems
Sort
View
ICASSP
2009
IEEE
14 years 2 months ago
Risk-distortion analysis for video collusion attack
Collusion attack is a cost-effective attack against digital fingerprint. To develop an efficient collusion-resistant fingerprint scheme, it is very important for the detector t...
Yan Chen, W. Sabrina Lin, K. J. Ray Liu
ICASSP
2009
IEEE
14 years 2 months ago
You are fired! Nonverbal role analysis in competitive meetings
This paper addresses the problem of social interaction analysis in competitive meetings, using nonverbal cues. For our study, we made use of ”The Apprentice” reality TV show, ...
Bogdan Raducanu, Jordi Vitrià, Daniel Gatic...
ICRA
2009
IEEE
227views Robotics» more  ICRA 2009»
14 years 2 months ago
Adaptive autonomous control using online value iteration with gaussian processes
— In this paper, we present a novel approach to controlling a robotic system online from scratch based on the reinforcement learning principle. In contrast to other approaches, o...
Axel Rottmann, Wolfram Burgard
ICRA
2009
IEEE
107views Robotics» more  ICRA 2009»
14 years 2 months ago
Autonomous driving in a multi-level parking structure
— Recently, the problem of autonomous navigation of automobiles has gained substantial interest in the robotics community. Especially during the two recent DARPA grand challenges...
Rainer Kümmerle, Dirk Hähnel, Dmitri Dol...
WEBI
2009
Springer
14 years 2 months ago
Effective Keyword Search for Software Resources Installed in Large-Scale Grid Infrastructures
—In this paper, we investigate the problem of supporting keyword-based searching for the discovery of software resources that are installed on the nodes of largescale, federated ...
George Pallis, Asterios Katsifodimos, Marios D. Di...