Sciweavers

49 search results - page 9 / 10
» Precomputing avatar behavior from human motion data
Sort
View
JSAC
2006
165views more  JSAC 2006»
13 years 7 months ago
Image-Based Anomaly Detection Technique: Algorithm, Implementation and Effectiveness
The frequent and large-scale network attacks have led to an increased need for developing techniques for analyzing network traffic. This paper presents NetViewer, a network measure...
Seong Soo Kim, A. L. Narasimha Reddy
SIGGRAPH
1999
ACM
13 years 11 months ago
Voice Puppetry
We introduce a method for predicting a control signal from another related signal, and apply it to voice puppetry: Generating full facial animation from expressive information in ...
Matthew Brand
ICRA
1999
IEEE
89views Robotics» more  ICRA 1999»
13 years 11 months ago
Failure Tolerant Teleoperation of a Kinematically Redundant Manipulator: An Experimental Study
Teleoperated robots in harsh environments have a significant likelihood of failures. It has been shown in previous work that a common type of failure such as that of a joint "...
Manish Goel, Anthony A. Maciejewski, Venkataramana...
ATAL
2009
Springer
14 years 1 months ago
Learning a model of speaker head nods using gesture corpora
During face-to-face conversation, the speaker’s head is continually in motion. These movements serve a variety of important communicative functions. Our goal is to develop a mod...
Jina Lee, Stacy Marsella
HCI
2009
13 years 4 months ago
Mind Monitoring via Mobile Brain-Body Imaging
Current brain-computer interface (BCI) research attempts to estimate intended operator body or cursor movements from his/her electroencephalographic (EEG) activity alone. More gene...
Scott Makeig