4,136 research outputs found
Amending Its Anti-Paparazzi Statute: California\u27s Latest Baby Step in Its Attempt to Curb the Aggressive Paparazzi
The financial rewards of celebrity photos have driven the paparazzi to increasingly dangerous tactics, often endangering celebrities and others in their pursuit of a valuable photo. In response to this danger, California amended its anti-paparazzi statute in 2005. The amended statute provides stiff penalties, including punitive and treble damages, and allows a celebrity to recover these damages for assault. However, assault requires the intent to cause apprehension of imminent contact, and much of the outrageous conduct of the paparazzi does not evidence this sort of intent. If California is serious about curbing improper behavior by the paparazzi, it should penalize the behavior that is the source of the problem: negligently causing apprehension of contact
Circular formation control of fixed-wing UAVs with constant speeds
In this paper we propose an algorithm for stabilizing circular formations of
fixed-wing UAVs with constant speeds. The algorithm is based on the idea of
tracking circles with different radii in order to control the inter-vehicle
phases with respect to a target circumference. We prove that the desired
equilibrium is exponentially stable and thanks to the guidance vector field
that guides the vehicles, the algorithm can be extended to other closed
trajectories. One of the main advantages of this approach is that the algorithm
guarantees the confinement of the team in a specific area, even when
communications or sensing among vehicles are lost. We show the effectiveness of
the algorithm with an actual formation flight of three aircraft. The algorithm
is ready to use for the general public in the open-source Paparazzi autopilot.Comment: 6 pages, submitted to IROS 201
Detecting replay attacks in audiovisual identity verification
We describe an algorithm that detects a lack of correspondence between speech and lip motion by detecting and monitoring the degree of synchrony between live audio and visual signals. It is simple, effective, and computationally inexpensive; providing a useful degree of robustness against basic replay attacks and against speech or image forgeries. The method is based on a cross-correlation analysis between two streams of features, one from the audio signal and the other from the image sequence. We argue that such an algorithm forms an effective first barrier against several kinds of replay attack that would defeat existing verification systems based on standard multimodal fusion techniques. In order to provide an evaluation mechanism for the new technique we have augmented the protocols that accompany the BANCA multimedia corpus by defining new scenarios. We obtain 0% equal-error rate (EER) on the simplest scenario and 35% on a more challenging one
Detecting replay attacks in audiovisual identity verification
We describe an algorithm that detects a lack of correspondence between speech and lip motion by detecting and monitoring the degree of synchrony between live audio and visual signals. It is simple, effective, and computationally inexpensive; providing a useful degree of robustness against basic replay attacks and against speech or image forgeries. The method is based on a cross-correlation analysis between two streams of features, one from the audio signal and the other from the image sequence. We argue that such an algorithm forms an effective first barrier against several kinds of replay attack that would defeat existing verification systems based on standard multimodal fusion techniques. In order to provide an evaluation mechanism for the new technique we have augmented the protocols that accompany the BANCA multimedia corpus by defining new scenarios. We obtain 0% equal-error rate (EER) on the simplest scenario and 35% on a more challenging one
Spartan Daily, September 3, 1997
Volume 109, Issue 3https://scholarworks.sjsu.edu/spartandaily/9150/thumbnail.jp
- …