Sciweavers

44 search results - page 3 / 9
» Quantifying presence using calling patterns
Sort
View
IROS
2006
IEEE
146views Robotics» more  IROS 2006»
14 years 1 months ago
Balance Control of a Humanoid Robot Based on the Reaction Null Space Method
— A humanoid robot should be able to keep its balance even in the presence of disturbing forces. Studies of human body reaction patterns to sudden external forces are useful to d...
Akinori Nishio, Kentaro Takahashi, Dragomir N. Nen...
ICMCS
2006
IEEE
142views Multimedia» more  ICMCS 2006»
14 years 1 months ago
Tricodes: A Barcode-Like Fiducial Design for Augmented Reality Media
Visual markers, or fiducials, have become one of the most common methods of camera pose estimation in Augmented Reality (AR) media. Many present day fiducial-based AR systems us...
Jonathan Mooser, Suya You, Ulrich Neumann
SIGSOFT
2005
ACM
14 years 28 days ago
Detecting higher-level similarity patterns in programs
Cloning in software systems is known to create problems during software maintenance. Several techniques have been proposed to detect the same or similar code fragments in software...
Hamid Abdul Basit, Stan Jarzabek
IPMI
2009
Springer
14 years 8 months ago
Non-rigid Image Registration with Uniform Spherical Structure Patterns
Abstract. Non-rigid image registration is a challenging task in medical image analysis. In recent years, there are two essential issues. First, intensity similarity is not necessar...
Albert C. S. Chung, Shu Liao
COMPSEC
2002
185views more  COMPSEC 2002»
13 years 7 months ago
A framework for understanding and predicting insider attacks
In this paper an insider attack is considered to be deliberate misuse by those who are authorized to use computers and networks. Applying this definition in real-life settings to ...
E. Eugene Schultz