Browsing Computer Science by Title
Now showing items 114-133 of 548
-
Deep learning-based expressive speech synthesis: a systematic review of approaches, challenges, and resources
(Springer, 2024-02-12)Speech synthesis has made significant strides thanks to the transition from machine learning to deep learning models. Contemporary text-to-speech (TTS) models possess the capability to generate speech of exceptionally high ... -
Deep multi-object symbol learning with self-attention based predictors
(IEEE, 2023)This paper proposes an architecture that can learn symbolic representations from the continuous sensorimotor experience of a robot interacting with a varying number of objects. Unlike previous works, this work aims to ... -
Deep reinforcement learning for acceptance strategy in bilateral negotiations
(TÜBİTAK, 2020)This paper introduces an acceptance strategy based on reinforcement learning for automated bilateral negotiation, where negotiating agents bargain on multiple issues in a variety of negotiation scenarios. Several acceptance ... -
Deepsym: Deep symbol generation and rule learning for planning from unsupervised robot interaction
(AI Access Foundation, 2022)Symbolic planning and reasoning are powerful tools for robots tackling complex tasks. However, the need to manually design the symbols restrict their applicability, especially for robots that are expected to act in open-ended ... -
Defect-aware nanocrossbar logic mapping through matrix canonization using two-dimensional radix sort
(ACM, 2011-08)Nanocrossbars (i.e., nanowire crossbars) offer extreme logic densities but come with very high defect rates; stuck-open/closed, broken nanowires. Achieving reasonable yield and utilization requires logic mapping that is ... -
Defining architectural viewpoints for quality concerns
(Springer Science+Business Media, 2011)A common practice in software architecture design is to apply architectural views to model the design decisions for the various stakeholder concerns. When dealing with quality concerns, however, it is more difficult to ... -
Democratization of HPC cloud services with automated parallel solvers and application containers
(Wiley, 2018-11-10)In this paper, we investigate several design choices for HPC services at different layers of the cloud computing architecture to simplify and broaden its use cases. We start with the platform-as-a-service (PaaS) layer and ... -
Democratization of runtime verification for internet of things
(Elsevier, 2018-05)Internet of Things (IoT) devices have gained more prevalence in ambient assisted living (AAL) systems. Reliability of AAL systems is critical especially in assuring the safety and well-being of elderly people. Runtime ... -
Deniz: A robust bidding strategy for negotiation support systems
(Springer, 2021)This paper presents the Deniz agent that has been specifically designed to support human negotiators in their bidding. The design of Deniz is done with the criteria of robustness and the availability of small data, due to ... -
Description-aware fashion image inpainting with convolutional neural networks in coarse-to-fine manner
(The ACM Digital Library, 2020-04-14)Inpainting a particular missing region in an image is a challenging vision task, and promising improvements on this task have been achieved with the help of the recent developments in vision-related deep learning studies. ... -
Design and implementation of a cloud computing service for finite element analysis
(Elsevier, 2013-06)This paper presents an end-to-end discussion on the technical issues related to the design and implementation of a new cloud computing service for finite element analysis (FEA). The focus is specifically on performance ... -
Design and implementation of a data stream management system with advanced complex event processing capabilities
(2013-06)The world has seen proliferation of data stream applications over the last years. These applications include computer network monitoring, Radio Frequency Identication (RFID)-based supply chain and traffic management systems, ... -
Design for ARINC 653 conformance: architecting independent validation of a safety-critical RTOS
(IEEE, 2014)The ARINC 653 specification not only provides a standard application programming interface for an RTOS, but also specifies how to validate an ARINC 653 based RTOS. ARINC 653 Part 3 Conformity Test Specification specifies ... -
Detection of Alzheimer's disease using prosodic cues in conversational speech
(IEEE, 2014)Automatic diagnosis of the Alzheimer's disease as well as monitoring of the diagnosed patients can make significant economic impact on societies. We investigated an automatic diagnosis approach through the use of speech ... -
Detection of malicious social bots: A survey and a refined taxonomy
(Elsevier, 2020-08-01)Social hots represent a new generation of hots that make use of online social networks (OSNs) as command and control (C&C) channels. Malicious social hots have been used as tools for launching large-scale spam campaigns, ... -
Deterministic neural illumination mapping for efficient auto-white balance correction
(IEEE, 2023)Auto-white balance (AWB) correction is a critical operation in image signal processors for accurate and consistent color correction across various illumination scenarios. This paper presents a novel and efficient AWB ... -
Developmental scaffolding with large language models
(IEEE, 2023)Exploration and self-observation are key mechanisms of infant sensorimotor development. These processes are further guided by parental scaffolding to accelerate skill and knowledge acquisition. In developmental robotics, ... -
DiBLIoT: A distributed blacklisting protocol for iot device classification using the hashgraph consensus algorithm
(IEEE Computer Society, 2022)Industrial applications require highly reliable, secure, low-power and low-delay communications. However, wireless communication links in the industrial environment suffer from various channel impairments which can compromise ... -
DILAF: A framework for distributed analysis of large-scale system logs for anomaly detection
(Wiley, 2019-02)System logs constitute a rich source of information for detection and prediction of anomalies. However, they can include a huge volume of data, which is usually unstructured or semistructured. We introduce DILAF, a framework ... -
Discovering frequent patterns to bootstrap trust
(Springer International Publishing, 2013)When a new agent enters to an open multiagent system, bootstrapping its trust becomes a challenge because of the lack of any direct or reputational evidence. To get around this problem, existing approaches assume the same ...
Share this page