Browsing Computer Science by Title
Now showing items 344-363 of 549
-
NatiQ: An end-to-end text-to-speech system for arabic
(Association for Computational Linguistics (ACL), 2022)NatiQ is end-to-end text-to-speech system for Arabic. Our speech synthesizer uses an encoder-decoder architecture with attention. We used both tacotron-based models (tacotron-1 and tacotron-2) and the faster transformer ... -
Natural language features for detection of Alzheimer's disease in conversational speech
(IEEE, 2014)Automatic monitoring of the patients with Alzheimer's disease and diagnosis of the disease in early stages can have a significant impact on the society. Here, we investigate an automatic diagnosis approach through the use ... -
A near Pareto optimal approach to student–supervisor allocation with two sided preferences and workload balance
(Elsevier, 2019-03)The problem of allocating students to supervisors for the development of a personal project or a dissertation is a crucial activity in the higher education environment, as it enables students to get feedback on their work ... -
Nearest neighbor approach in speaker adaptation for HMM-based speech synthesis
(IEEE, 2013)Statistical speech synthesis (SSS) approach has become one of the most popular and successful methods in the speech synthesis field. Smooth speech transitions, without the spurious errors that are observed in unit selection ... -
Need for low latency: Media over QUIC
(ACM, 2023-06-16)This paper overviews developing a low-latency solution for media ingest and distribution, the work undertaken by the IETF's new Media over QUIC (moq) working group. It summarizes the motivation, goals, current work and ... -
NEEL: The nested complex event language for real-time event analytics
(Springer International Publishing, 2011)Complex event processing (CEP) over event streams has become increasingly important for real-time applications ranging from health care, supply chain management to business intelligence. These monitoring applications submit ... -
Negotiation for incentive driven privacy-preserving information sharing
(Springer International Publishing, 2017)This paper describes an agent-based, incentive-driven, and privacy-preserving information sharing framework. Main contribution of the paper is to give the data provider agent an active role in the information sharing process ... -
-
Networking standards
(IEEE, 2017-03)The article in this special section focus on the market for new networking technologies. Networking technologies are advancing faster than ever before. Aspects driving this change in velocity is the need to support faster, ... -
NFT primary sale price and secondary sale prediction via deep learning
(Association for Computing Machinery, Inc, 2023-11-27)Non Fungible Tokens (NFTs) are blockchain-based unique digital assets defining ownership deeds. They can characterize various different objects such as collectible, art, and in-game items. In general, NFTs are encoded by ... -
Not all mistakes are equal
(The ACM Digital Library, 2020)In many tasks, classifiers play a fundamental role in the way an agent behaves. Most rational agents collect sensor data from the environment, classify it, and act based on that classification. Recently, deep neural networks ... -
Nova: Value-based negotiation of norms
(ACM, 2021-08-01)Specifying a normative multiagent system (nMAS) is challenging, because different agents often have conflicting requirements. Whereas existing approaches can resolve clear-cut conflicts, tradeoffs might occur in practice ... -
A novel GBT-based approach for cross-channel fraud detection on real-world banking transactions
(IEEE, 2022)The most recent research on hundreds of financial institutions uncovered that only 26 % of them have a team assigned to detect cross-channel fraud. Due to the developing technologies, various fraud techniques have emerged ... -
A novel intelligent approach for detecting DoS flooding attacks in software-defined networks
(Universitas Ahmad Dahlan, 2018-03)Software-Defined Networking (SDN) is an emerging networking paradigm that provides an advanced programming capability and moves the control functionality to a centralized controller. This paper proposes a two-stage novel ... -
A novel runtime verification solution for LoT systems
(IEEE, 2018)Internet of Things (IoT) systems promise a seamless connected world with machines integrating their services without human intervention. It's highly probable that the entities participating in such autonomous machine to ... -
NTIRE 2022 challenge on night photography rendering
(IEEE, 2022)This paper reviews the NTIRE 2022 challenge on night photography rendering. The challenge solicited solutions that processed RAW camera images captured in night scenes to produce a photo-finished output image encoded in ... -
NTIRE 2023 challenge on night photography rendering
(IEEE, 2023)This paper presents a review of the NTIRE 2023 challenge on night photography rendering. The goal of the challenge was to find solutions that process raw camera images taken in nighttime conditions conditions, and thereby ... -
Objective and subjective QoE evaluation for adaptive point cloud streaming
(IEEE, 2020-05)Volumetric media has the potential to provide the six degrees of freedom (6DoF) required by truly immersive media. However, achieving 6DoF requires ultra-high bandwidth transmissions, which real-world wide area networks ... -
Observing interoperability of IoT systems through model-based testing
(Springer Nature, 2018)Internet of Things (IoT) has drastically modified the industrial services provided through autonomous machine-to-machine interactions. Such systems comprise of devices manufactured by various suppliers. Verification is a ... -
OCR-aided person annotation and label propagation for speaker modeling in TV shows
(IEEE, 2016)In this paper, we present an approach for minimizing human effort in manual speaker annotation. Label propagation is used at each iteration of an active learning cycle. More precisely, a selection strategy for choosing the ...
Share this page