Search Results - "2010 International Conference on Emerging Security Technologies"

Refine Results
  1. 1

    Supporting Search and Rescue Operations with UAVs by Waharte, S, Trigoni, N

    “…Search and rescue operations can greatly benefit from the use of autonomous UAVs to survey the environment and collect evidence about the position of a missing…”
    Get full text
    Conference Proceeding
  2. 2

    Person Identification from Spatio-temporal 3D Gait by Iwashita, Yumi, Baba, Ryosuke, Ogawara, Koichi, Kurazume, Ryo

    “…This paper presents a spatio-temporal 3D gait database and a view independent person identification method from gait. In case that a target changes one's…”
    Get full text
    Conference Proceeding
  3. 3

    Biosignals for User Authentication - Towards Cognitive Biometrics? by Revett, K, Deravi, F, Sirlantzis, K

    “…Cognitive biometrics refers to a novel approach for user authentication/identification utilising biosignals which reflect the mental and emotional states of an…”
    Get full text
    Conference Proceeding
  4. 4

    Behaviour Profiling on Mobile Devices by Fudong Li, Clarke, Nathan, Papadaki, Maria, Dowland, Paul

    “…Over the last decade, the mobile device has become a ubiquitous tool within everyday life. Unfortunately, whilst the popularity of mobile devices has…”
    Get full text
    Conference Proceeding
  5. 5

    Vision-Based Landing of a Simulated Unmanned Aerial Vehicle with Fast Reinforcement Learning by Shaker, Marwan, Smith, Mark N R, Shigang Yue, Duckett, Tom

    “…Landing is one of the difficult challenges for an unmanned aerial vehicle (UAV). In this paper, we propose a vision-based landing approach for an autonomous…”
    Get full text
    Conference Proceeding
  6. 6

    Giving Crime the 'evo': Catching Criminals Using EvoFIT Facial Composites by Frowd, C D, Hancock, P J B, Bruce, V, McIntyre, A H, Pitchford, M, Atkins, R, Webster, A, Pollard, J, Hunt, B, Price, E, Morgan, S, Stoika, A, Dughila, R, Maftei, S, Sendrea, G

    “…Facial composites are traditionally made by witnesses and victims describing and selecting parts of criminals' faces, but this method is hard to do and has…”
    Get full text
    Conference Proceeding
  7. 7

    Fusion of Omnidirectional and PTZ Cameras for Face Detection and Tracking by Amine Iraqui, H, Dupuis, Yohan, Boutteau, Rémi, Ertaud, Jean-Yves, Savatier, Xavier

    “…Many applications for mobile robot authentication require to be able to explore a large field of view with high resolution. The proposed vision system is…”
    Get full text
    Conference Proceeding
  8. 8

    Seeing More Clearly with Glasses?: The Impact of Glasses and Technology on Unfamiliar Face Matching and Identification of Facial Composites by McIntyre, Alex H, Hancock, Peter J B, Frowd, Charlie D, Bruce, Vicki

    “…The development of facial identification technologies is of vital importance for security. We demonstrate that psychology can ensure innovation produces…”
    Get full text
    Conference Proceeding
  9. 9

    Password Security through Negative Filtering by Dasgupta, Dipankar, Saha, Sudip

    “…The purpose of an authentication system is to identify and verify incoming authentication requests comparing with some form of (stored) user identity. This…”
    Get full text
    Conference Proceeding
  10. 10

    Principled Electronic Consent Management: A Preliminary Research Framework by Bonnici, C J, Coles-Kemp, L

    “…Consent is a multifaceted concept that has not received much attention in information systems literature. In this paper we categorise current electronic…”
    Get full text
    Conference Proceeding
  11. 11

    Are Two Eyes Better than One? An Experimental Investigation on Dual Iris Recognition by Radu, P, Sirlantzis, K, Howells, G, Hoque, S, Deravi, F

    “…Iris recognition using both eyes of an individual has not been extensively researched in the available literature. However, for iris recognition at a distance,…”
    Get full text
    Conference Proceeding
  12. 12

    Learning Arm Motion Strategies for Balance Recovery of Humanoid Robots by Nakada, Masaki, Allen, Brian, Morishima, Shigeo, Terzopoulos, Demetri

    “…Humans are able to robustly maintain balance in the presence of disturbances by combining a variety of control strategies using posture adjustments and limb…”
    Get full text
    Conference Proceeding
  13. 13

    Learning Flexible Full Body Kinematics for Humanoid Tool Use by Rolf, M, Steil, J J, Gienger, M

    “…We show that inverse kinematics of different tools can be efficiently learned with a single recurrent neural network. Our model exploits all upper body degrees…”
    Get full text
    Conference Proceeding
  14. 14

    Learning the Consequences of Actions: Representing Effects as Feature Changes by Rudolph, Mathias, Mühlig, Manuel, Gienger, Michael, Böhme, Hans-Joachim

    “…In advanced Programming by Demonstration (PbD) it is important to give a robot the ability to understand the effects of an action. This ability can enable a…”
    Get full text
    Conference Proceeding
  15. 15

    A Comparison of Individual and Morphed Facial Composites Created Using Different Systems by Davis, J P, Sulley, L, Solomon, C, Gibson, S

    “…An evaluation of individual and morphed composites created using the E-FIT and EFIT-V production systems was conducted. With the assistance of trained police…”
    Get full text
    Conference Proceeding
  16. 16

    A Game-Theoretical Model Applied to an Active Patrolling Camera by Basilico, N, Rossignoli, D, Gatti, N, Amigoni, F

    “…In patrolling, an agent perceives portions of an environment to detect the presence of an intruder. Usually, the agent cannot perceive the whole environment at…”
    Get full text
    Conference Proceeding
  17. 17

    Keynote Talks

    “…Summary form only given. Provides an abstract for each of the keynote presentations and a brief professional biography of each presenter…”
    Get full text
    Conference Proceeding
  18. 18

    Preface

    “…Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the…”
    Get full text
    Conference Proceeding
  19. 19

    Attentive Monitoring Strategies in a Behavior-Based Robotic System: An Evolutionary Approach by Burattini, Ernesto, Finzi, Alberto, Rossi, Silvia, Staffa, Mariacarla

    “…In this paper, we propose an evolutionary approach to develop an attentive executive control system for a robotic agent. We consider a behavior-based system…”
    Get full text
    Conference Proceeding
  20. 20

    Audio-Based Indoor Health Monitoring System Using FLAC Features by Jiaxing Ye, Kobayashi, Takumi, Higuchi, Tetsuya

    “…In this paper, we present a novel methodology for indoor health monitoring based on acoustic information. The system detects the patient's symptom sounds which…”
    Get full text
    Conference Proceeding