This paper presents a workshop organized in conjunction with DIMEA2008 with focus on ludic and aesthetic aspects of Pervasive Awareness Systems. The workshop aims at bringing together different perspectives on the top...
详细信息
ISBN:
(纸本)9781605582481
This paper presents a workshop organized in conjunction with DIMEA2008 with focus on ludic and aesthetic aspects of Pervasive Awareness Systems. The workshop aims at bringing together different perspectives on the topic and challenge mainstream assumptions underlying the design of these systems. The workshop combines presentations and hands-on activities with the aim to promote interactivity and creativity. Copyright 2008 ACM.
We demonstrate that structured light-based depth sensing with standard perception algorithms can enable mobile peerto- peer interaction between humans and robots. We posit that the use of recent emerging devices for d...
详细信息
ISBN:
(纸本)9781605584041
We demonstrate that structured light-based depth sensing with standard perception algorithms can enable mobile peerto- peer interaction between humans and robots. We posit that the use of recent emerging devices for depth-based imaging can enable robot perception of non-verbal cues in human movement in the face of lighting and minor terrain variations. Toward this end, we have developed an integrated robotic system capable of person following and responding to verbal and non-verbal commands under varying lighting conditions and uneven terrain. The feasibility of our system for peer-to-peer HRI is demonstrated through two trials in indoor and outdoor environments. Copyright 2009 ACM.
In this work, it is demonstrated that relatively simple image processing functions based on symmetry measurements can be used to obtain high performance vehicle authentication, creating an "image signature" ...
详细信息
ISBN:
(纸本)9788890314933
In this work, it is demonstrated that relatively simple image processing functions based on symmetry measurements can be used to obtain high performance vehicle authentication, creating an "image signature" for every vehicle. On that basis, distinctive parts of the vehicle frontal view such as the headlights and the logo area can be segmented. A novel neural network application, properly trained, provides adequate vehicle manufacturer recognition when used in conjunction with a previously developed license plate recognition module. It is also shown that image processing functions based on Scale Invariant Feature Transform (SIFT) measurements can be used to obtain high performance object features location, creating a keypoint fingerprint for every feature. A grid of SIFT keypoints was drawn and a neural network was used also for vehicle model recognition.
e-Tourism is a tourist recommendation and planning application to assist users on the organization of a leisure and tourist agenda. First, a recommender system offers the user a list of the city places that are likely...
详细信息
e-Tourism is a tourist recommendation and planning application to assist users on the organization of a leisure and tourist agenda. First, a recommender system offers the user a list of the city places that are likely of interest to the user. This list takes into account the user demographic classification, the user likes in former trips and the preferences for the current visit. Second, a planning module schedules the list of recommended places according to their temporal characteristics as well as the user restrictions; that is the planning system determines how and when to perform the recommended activities. This is a very relevant feature that most recommender systems lack as it allows the user to have the list of recommended activities organized as an agenda, i.e. to have a totally executable plan.
Road segmentation is an essential functionality for supporting advanced driver assistance systems (ADAS) such as road following or vehicle detection and tracking. Significant efforts have been made in order to solve t...
详细信息
Road segmentation is an essential functionality for supporting advanced driver assistance systems (ADAS) such as road following or vehicle detection and tracking. Significant efforts have been made in order to solve this task using vision-based techniques. One of the major challenges of these techniques is dealing with lighting variations, especially shadows. Many of the approaches presented within this field use ad-hoc mechanisms applied after an initial segmentation to recover shadowed road patches. In this paper, we present an innovative method to obtain a road segmentation algorithm robust to extreme shadow conditions. The novelty of the proposal is the use of a shadowless feature space in combination with a model-based region growing algorithm. The former projects the color images such that the shadow effect is greatly attenuated. The latter uses histogram models to label the pixels as belonging to the road or to the background. These models are constructed on a frame by frame basis independently of the road shape to avoid limitations when addressing unstructured roads. The results presented show the validity of our approach.
This paper presents an improved version of our specific methodology to detect the vessel tree in retinal angiographies. The automatic analysis of retinal vessel tree facilitates the computation of the arteriovenous in...
详细信息
ISBN:
(纸本)9781424421749
This paper presents an improved version of our specific methodology to detect the vessel tree in retinal angiographies. The automatic analysis of retinal vessel tree facilitates the computation of the arteriovenous index, which is essential for the diagnosis several eye diseases. The developed system is inspired in the classical snake but incorporating domain specific knowledge, such as blood vessels topological properties. It profits from the automatic localization of the optic disc, the vessel creases extraction and, as a recent innovation, the morphological vessel segmentation, all developed in our research group. After researching and testing our system, the parameter configuration has been enhanced. Significantly better results in the detection of arteriovenous structures are obtained, keeping a high efficiency, as shown by the systems performance evaluation on the publicly available DRIVE database.
Stochastic constraint satisfaction is a framework that allows to make decisions taking into account possible futures. We study two challenging aspects of this framework: (1) variables in stochastic CSP are ordered seq...
详细信息
ISBN:
(纸本)1595934804;9781595934802
Stochastic constraint satisfaction is a framework that allows to make decisions taking into account possible futures. We study two challenging aspects of this framework: (1) variables in stochastic CSP are ordered sequentially, which is adequate for the representation of a number of problems, but is not a natural choice for the modeling of problems in which the future can follow different branches (2) the framework was designed to allow multi-objective decision-making, yet this issue has been treated only superficially in the literature. We bring a number of clarifications to these two aspects. In particular, we show how minor modifications allow the framework to deal with non-sequential forms, we identify a number of technicalities related to the use of the sequential ordering of variables and of the use of multiple objectives, and in addition we propose the first search algorithm that solves multi-objective stochastic problems in polynomial space. Copyright 2007 ACM.
Silence detection and dynamic audio quality are two factors that greatly impact the design and implementation of a P2P multiconference system. In this paper, simple audio broadcasting is taken as the basis of the mult...
详细信息
Silence detection and dynamic audio quality are two factors that greatly impact the design and implementation of a P2P multiconference system. In this paper, simple audio broadcasting is taken as the basis of the multiconference scheme and different alternatives regarding multiplexing, cryptographic primitives and implementation issues are studied. The implementation of subchanneling over this scheme is also analyzed.
Research on trust management systems for wireless sensor networks is still at a very early stage and few works have done so far. It seems that for those works which deal with the topic general features of how these sy...
详细信息
The component functions {Ψ n ( ε )} ( n 2 Z + ) from difference Schrödinger operators, can be formulated in a second order linear difference equation. Then the Harper equation, associated to almost-Mathieu oper...
暂无评论