Browsing Computer Science by Issue Date
Now showing items 81-100 of 549
-
Reasoning about uncertain information and conflict resolution through trust revision
(International Foundation for Autonomous Agents and Multiagent Systems, 2013)In information driven MAS, information consumers collect information about their environment from various sources such as sensors. However, there is no guarantee that a source will provide the requested information truthfully ... -
High-performance complex event processing using continuous sliding views
(ACM, 2013)Complex Event Processing (CEP) has become increasingly important for tracking and monitoring anomalies and trends in event streams emitted from business processes such as supply chain management to online stores in e-commerce. ... -
Automatic fall detection for elderly by using features extracted from skeletal data
(IEEE, 2013)Automatic detection of unusual events such as falls is very important especially for elderly people living alone. Realtime detection of these events can reduce the health risks associated with a fall. In this paper, we ... -
The FIRMER-square contour algorithm
(Springer International Publishing, 2013)The recently proposed Square Contour Algorithm (SCA) provides a good solution to the blind equalization problem as it does not suffer from any type of phase rotation. However, its suitability to Code Division Multiple ... -
Welcome from the general chairs
(IEEE, 2013) -
A fast circuit topology for finding the maximum of n k-bit numbers
(IEEE, 2013)Finding the value and/or address (position) of the maximum element of a set of binary numbers is a fundamental arithmetic operation. Numerous systems, which are used in different application areas, require fast (low-latency) ... -
Discovering frequent patterns to bootstrap trust
(Springer International Publishing, 2013)When a new agent enters to an open multiagent system, bootstrapping its trust becomes a challenge because of the lack of any direct or reputational evidence. To get around this problem, existing approaches assume the same ... -
Büyük veri problemlerine çözüm olarak veri akış madenciliği
(IEEE, 2013)Günümüzde bilişim dünyası faydalı bilgiye ulaşma yolunda “büyük veri” problemleri (verinin kütlesi, hızı, çeşitliliği, tutarsızlığı) ile baş etmeye çalışmaktadır. Bu makalede, büyük veri akışları üzerinde İlişkisel Kural ... -
Fault masking as a service
(2013-01)In service-oriented architectures, composite services depend on a set of partner services to perform their tasks. These partner services may become unavailable due to system and/or network faults, leading to an increased ... -
A hybrid reasoning mechanism for effective sensor selection for tasks
(Elsevier, 2013-02)In this paper, we present Ontological Logic Programming (OLP), a novel approach that combines logic programming with ontological reasoning. OLP enables the use of ontological terms (i.e., individuals, classes and properties) ... -
Mirror neurons: Functions, mechanisms and models
(Elsevier, 2013-04-12)Mirror neurons for manipulation fire both when the animal manipulates an object in a specific way and when it sees another animal (or the experimenter) perform an action that is more or less similar. Such neurons were ... -
A robotics summer camp for high school students: pipelines activities promoting careers in engineering fields
(American Society for Engineering Education, 2013-06)In this paper we discuss the lived-experiences and the career interests of 27 high school students who participated in a two-week Robotics summer camp in 2012. The summer camp was designed by a team of engineering faculty, ... -
Design and implementation of a cloud computing service for finite element analysis
(Elsevier, 2013-06)This paper presents an end-to-end discussion on the technical issues related to the design and implementation of a new cloud computing service for finite element analysis (FEA). The focus is specifically on performance ... -
Design and implementation of a data stream management system with advanced complex event processing capabilities
(2013-06)The world has seen proliferation of data stream applications over the last years. These applications include computer network monitoring, Radio Frequency Identication (RFID)-based supply chain and traffic management systems, ... -
Optimizing decomposition of software architecture for local recovery
(Springer Science+Business Media, 2013-06)The increasing size and complexity of software systems has led to an amplified number of potential failures and as such makes it harder to ensure software reliability. Since it is usually hard to prevent all the failures, ... -
Real-time event correlation and alarm rule mining models for complex event processing systems
(2013-08)World is creating the same quantity of data every two days, as it created from up until 2003. Evolving data streams are key factor for the growth of data created over the last few years. Streaming data analysis in real-time ... -
A smart cloud platform service for socialized travel and transportation with mobile support
(2013-09)It is now clear that social networking services are evolving towards mobile web applications and continuous location sharing is also becoming a trend. In this evolution, we believe that the next step will be complete and ... -
MOO: An architectural framework for runtime optimization of multiple system objectives in embedded control software
(Elsevier, 2013-10)Today's complex embedded systems function in varying operational conditions. The control software adapts several control variables to keep the operational state optimal with respect to multiple objectives. There exist ... -
Adaptive domain-specific service monitoring
(Springer Science+Business Media, 2014)We propose an adaptive and domain-specific service monitoring approach to detect partner service errors in a cost-effective manner. Hereby, we not only consider generic errors such as file not found or connection timed ... -
Trust-based fusion of classifiers for static code analysis
(IEEE, 2014)Static code analysis tools automatically generate alerts for potential software faults that can lead to failures. However, developers are usually exposed to a large number of alerts. Moreover, some of these alerts are ...
Share this page