Search
Now showing items 1-10 of 24
A multi-sensor integrated head-mounted display setup for augmented reality applications
(IEEE, 2015)
We present an HMD based AR system comprising visual and inertial sensors. The visual sensor is a camera pair and the inertial sensors consist of an accelerometer and a gyroscope. We discuss the temporal and spatial calibration ...
Cooperative multi-task assignment for heterogonous UAVs
(IEEE, 2015)
This research is focused on the cooperative multi-task assignment problem for heterogeneous UAVs, where a set of multiple tasks, each requiring a predetermined number of UAVs, have to be completed at specific locations. ...
Combining model-based and risk-based testing for effective test case generation
(IEEE, 2015)
Model-based testing employs models of the system under test to automatically generate test cases. In this paper, we propose an iterative approach, in which these models are refined based on the principles of risk-based ...
FUSE-BEE: Fusion of subjective opinions through behavior estimation
(IEEE, 2015)
Information is critical in almost all decision making processes. Therefore, it is important to get the right information at the right time from the right sources. However, information sources may behave differently while ...
Towards automatic selection of direct vs. iterative solvers for cloud-based finite element analysis
(Civil-Comp, 2015)
The new trend in engineering is to solve complex computational problems in the cloud using high performance computing (HPC) services provided by different vendors. In this paper, we compare performances of direct vs. ...
Simultaneous human-robot adaptation for effective skill transfer
(IEEE, 2015)
In this paper, we propose and implement a human-in-the loop robot skill synthesis framework that involves simultaneous adaptation of the human and the robot. In this framework, the human demonstrator learns to control the ...
SAS : A speaker verification spoofing database containing diverse attacks
(IEEE, 2015)
This paper presents the first version of a speaker verification spoofing and anti-spoofing database, named SAS corpus. The corpus includes nine spoofing techniques, two of which are speech synthesis, and seven are voice ...
Strategies for truth discovery under resource constraints
(ACM, 2015)
We present a decision-theoretic approach for sampling information sources in resource-constrained environments, where there is uncertainty regarding source trustworthiness. We exploit diversity among sources to stratify ...
Dynamic movement primitives for human movement recognition
(IEEE, 2015)
Dynamic Movement Primitives (DMPs)-originally a method for movement trajectory generation [1] has been also used for recognition tasks [2, 3]. However there has not been a systematic comparison between other recognition ...
Integrated static code analysis and runtime verification
(Wiley, 2015-10)
Static code analysis tools automatically generate alerts for potential software faults that can lead to failures. However, these tools usually generate a very large number of alerts, some of which are subject to false ...
Share this page