Now showing items 1591-1610 of 2232

    • Predicting Daily Activities From Egocentric Images Using Deep Learning 

      Castro, Daniel; Hickson, Steven; Bettadapura, Vinay; Thomaz, Edison; Abowd, Gregory; Christensen, Henrik; Essa, Irfan (Georgia Institute of TechnologyAssociation for Computing Machinery, 2015)
      We present a method to analyze images taken from a passive egocentric wearable camera along with the contextual information, such as time and day of week, to learn and predict everyday activities of an individual. We ...
    • Prediction of secondary structures for large RNA molecules 

      Mathuriya, Amrita (Georgia Institute of Technology, 2009-01-12)
      The prediction of correct secondary structures of large RNAs is one of the unsolved challenges of computational molecular biology. Among the major obstacles is the fact that accurate calculations scale as O(n⁴), so the ...
    • Predictive models for online human activities 

      Yang, Shuang-Hong (Georgia Institute of Technology, 2012-04-04)
      The availability and scale of user generated data in online systems raises tremendous challenges and opportunities to analytic study of human activities. Effective modeling of online human activities is not only fundamental ...
    • Prefetching Without Hints: A Cost-Benefit Analysis for Predicted Accesses 

      Vellanki, Vivekanand; Chervenak, Ann L. (Georgia Institute of Technology, 1999)
      Prefetching disk blocks to main memory will become increasingly important to overcome the widening gap between disk access times and processor speeds. We present a prefetching scheme that chooses which blocks to prefetch ...
    • Prefix-Preserving IP Address Anonymization: Measurement-based Security Evaluation and a New Cryptography-based Scheme 

      Xu, Jun; Fan, Jinliang; Ammar, Mostafa H. (Mostafa Hamed); Moon, Sue B. (Georgia Institute of Technology, 2002)
      Real-world traffic traces are crucial for Internet research, but only a very small percentage of traces collected are made public. One major reason why traffic trace owners hesitate to make the traces publicly available ...
    • Preserving Dignity in Patient Caregiver Relationships Using Moral Emotions and Robots 

      Arkin, Ronald C.; Scheutz, Matthias; Tickle-Degnen, Linda (Georgia Institute of Technology, 2014)
      This paper provides an overview of an ongoing NSF project that is intended to improve the long-term quality of care for patients suffering from early stage Parkinson’s disease. Due to facial masking in the patient, a ...
    • Preventing abuse of online communities 

      Irani, Danesh (Georgia Institute of Technology, 2012-07-02)
      Online communities are growing at a phenomenal rate and with the large number of users these communities contain, attackers are drawn to exploit these users. Denial of information (DoI) attacks and information leakage ...
    • Preventing Attacks on BGP Policies: One Bit is Enough 

      Sundaresan, Srikanth; Lychev, Robert; Valancius, Vytautas (Georgia Institute of Technology, 2011)
      The Internet is comprised of many autonomous systems (AS) managed by independent entities that use the Border Gateway Protocol (BGP) to route their traffic. Although it is the de facto standard for establishing paths ...
    • Preventing exploits against memory corruption vulnerabilities 

      Song, Chengyu (Georgia Institute of Technology, 2016-08-02)
      The most common cyber-attack vector is exploit of software vulnerability. Despite much efforts toward building secure software, software systems of even modest complexity still routinely have serious vulnerabilities. More ...
    • Prices, Auctions, and Combinatorial Prophet Inequalities 

      Lucier, Brendan (2016-10-03)
      The most common way to sell resources, from apples to business licenses to concert tickets, is to post prices. A choice of prices can be viewed as an algorithm for an online stochastic optimization problem, which makes ...
    • The primary logics of programming languages 

      Winner, Robert Ian (Georgia Institute of Technology, 1975-08)
    • Primate - Inspired Vehicle Navigation Using Optic Flow and Mental Rotations 

      Arkin, Ronald C.; Dellaert, Frank; Srinivasa, Natesh; Kerwin, Ryan (Georgia Institute of Technology, 2013)
      Robot navigation already has many relatively efficient solutions: reactive control, simultaneous localization and mapping (SLAM), Rapidly-Exploring Random Trees (RRTs), etc. But many primates possess an additional inherent ...
    • A Primate-inspired Autonomous Navigation Algorithm Using the Cognitive Mechanism of Mental Rotation 

      Pettinati, Michael J.; Arkin, Ronald C. (Georgia Institute of Technology, 2014)
      Though significant progress on autonomous navigation has been made, the natural world offers interesting examples of navigational techniques that are worth exploring and understanding. The cognitive mechanism of mental ...
    • Privacy and Proportionality 

      Iachello, Giovanni (Georgia Institute of Technology, 2006-04-03)
      Over the past several years, the press, trade publications and academic literature have reported with increasing frequency on the social concerns caused by ubiquitous computingInformation Technology (IT) embedded in ...
    • Privacy Preserving Grapevines: Capturing Social Network Interactions Using Delegatable Anonymous Credentials 

      Balasubramaniyan, Vijay A.; Lee, Younho; Ahamad, Mustaque (Georgia Institute of Technology, 2009)
      A wide variety of services allow users to meet online and communicate with each other, building new social relationships and reinforcing older ones. Unfortunately, malicious entities can exploit such services for fraudulent ...
    • Probabilistic Analysis of Incremental Light Bundle Adjustment 

      Indelman, Vadim; Roberts, Richard; Dellaert, Frank (Georgia Institute of TechnologyInstitute of Electrical and Electronics Engineers, 2013-01)
      This paper presents a probabilistic analysis of the recently introduced incremental light bundle adjustment method (iLBA) [6]. In iLBA, the observed 3D points are algebraically eliminated, resulting in a cost ...
    • A Probabilistic Approach to the Semantic Interpretation of Building Facades 

      Alegre, Fernando; Dellaert, Frank (Georgia Institute of TechnologyCIPA, 2004)
      Semantically-enhanced 3D model reconstruction in urban environments is useful in a variety of applications, such as extracting metric and semantic information about buildings, visualizing the data in a way that outlines ...
    • Probabilistic boolean logic, arithmetic and architectures 

      Chakrapani, Lakshmi Narasimhan (Georgia Institute of Technology, 2008-08-25)
      Parameter variations, noise susceptibility, and increasing energy dissipation of CMOS devices have been recognized as major challenges in circuit and micro-architecture design in the nanometer regime. Among ...
    • Probabilistic Human Action Prediction and Wait-sensitive Planning for Responsive Human-robot Collaboration 

      Hawkins, Kelsey P.; Vo, Nam; Bansal, Shray; Bobic, Aaron F. (Georgia Institute of TechnologyInstitute of Electrical and Electronics Engineers, 2013-10)
      A novel representation for the human component of multi-step, human-robot collaborative activity is presented. The goal of the system is to predict in a probabilistic manner when the human will perform different subtasks ...
    • Probabilistic Planning for Behavior-Based Robots 

      Atrash, Amin; Koenig, Sven (Georgia Institute of Technology, 2001)
      Partially Observable Markov Decision Process models (POMDPs) have been applied to low-level robot control. We show how to use POMDPs differently, namely for sensor-planning in the context of behavior-based robot systems. ...