Browsing Computer Science by Title
Now showing items 123-142 of 549
-
Deniz: A robust bidding strategy for negotiation support systems
(Springer, 2021)This paper presents the Deniz agent that has been specifically designed to support human negotiators in their bidding. The design of Deniz is done with the criteria of robustness and the availability of small data, due to ... -
Description-aware fashion image inpainting with convolutional neural networks in coarse-to-fine manner
(The ACM Digital Library, 2020-04-14)Inpainting a particular missing region in an image is a challenging vision task, and promising improvements on this task have been achieved with the help of the recent developments in vision-related deep learning studies. ... -
Design and implementation of a cloud computing service for finite element analysis
(Elsevier, 2013-06)This paper presents an end-to-end discussion on the technical issues related to the design and implementation of a new cloud computing service for finite element analysis (FEA). The focus is specifically on performance ... -
Design and implementation of a data stream management system with advanced complex event processing capabilities
(2013-06)The world has seen proliferation of data stream applications over the last years. These applications include computer network monitoring, Radio Frequency Identication (RFID)-based supply chain and traffic management systems, ... -
Design for ARINC 653 conformance: architecting independent validation of a safety-critical RTOS
(IEEE, 2014)The ARINC 653 specification not only provides a standard application programming interface for an RTOS, but also specifies how to validate an ARINC 653 based RTOS. ARINC 653 Part 3 Conformity Test Specification specifies ... -
Detection of Alzheimer's disease using prosodic cues in conversational speech
(IEEE, 2014)Automatic diagnosis of the Alzheimer's disease as well as monitoring of the diagnosed patients can make significant economic impact on societies. We investigated an automatic diagnosis approach through the use of speech ... -
Detection of malicious social bots: A survey and a refined taxonomy
(Elsevier, 2020-08-01)Social hots represent a new generation of hots that make use of online social networks (OSNs) as command and control (C&C) channels. Malicious social hots have been used as tools for launching large-scale spam campaigns, ... -
Deterministic neural illumination mapping for efficient auto-white balance correction
(IEEE, 2023)Auto-white balance (AWB) correction is a critical operation in image signal processors for accurate and consistent color correction across various illumination scenarios. This paper presents a novel and efficient AWB ... -
Developmental scaffolding with large language models
(IEEE, 2023)Exploration and self-observation are key mechanisms of infant sensorimotor development. These processes are further guided by parental scaffolding to accelerate skill and knowledge acquisition. In developmental robotics, ... -
DiBLIoT: A distributed blacklisting protocol for iot device classification using the hashgraph consensus algorithm
(IEEE Computer Society, 2022)Industrial applications require highly reliable, secure, low-power and low-delay communications. However, wireless communication links in the industrial environment suffer from various channel impairments which can compromise ... -
DILAF: A framework for distributed analysis of large-scale system logs for anomaly detection
(Wiley, 2019-02)System logs constitute a rich source of information for detection and prediction of anomalies. However, they can include a huge volume of data, which is usually unstructured or semistructured. We introduce DILAF, a framework ... -
Discovering frequent patterns to bootstrap trust
(Springer International Publishing, 2013)When a new agent enters to an open multiagent system, bootstrapping its trust becomes a challenge because of the lack of any direct or reputational evidence. To get around this problem, existing approaches assume the same ... -
Discovering predictive relational object symbols with symbolic attentive layers
(IEEE, 2024-02-01)In this letter, we propose and realize a new deep learning architecture for discovering symbolic representations for objects and their relations based on the self-supervised continuous interaction of a manipulator robot ... -
Disentangling human trafficking types and the identification of pathways to forced labor and sex: an explainable analytics approach
(Springer, 2023-07)Terms such as human trafficking and modern-day slavery are ephemeral but reflect manifestations of oppression, servitude, and captivity that perpetually have threatened the basic right of all humans. Operations research ... -
A distributed approach for bitrate selection in HTTP adaptive streaming
(ACM, 2018)Past research has shown that concurrent HTTP adaptive streaming (HAS) players behave selfishly and the resulting competition for shared resources leads to underutilization or oversubscription of the network, presentation ... -
Distributed decision trees
(Springer, 2022)In a budding tree, every node is part internal node and part leaf. This allows representing the tree in a continuous parameter space and training it with backpropagation, like a neural network. Unlike a traditional tree ... -
DNN-based speaker-adaptive postfiltering with limited adaptation data for statistical speech synthesis systems
(IEEE, 2019)Deep neural networks (DNNs) have been successfully deployed for acoustic modelling in statistical parametric speech synthesis (SPSS) systems. Moreover, DNN-based postfilters (PF) have also been shown to outperform conventional ... -
Do not predict – Recompute! How value recomputation can truly boost the performance of invisible speculation
(IEEE, 2021)Recent architectural approaches that address speculative side-channel attacks aim to prevent software from exposing the microarchitectural state changes of transient execution. The Delay-on-Miss technique is one such ... -
DPSec: A blockchain-based data plane authentication protocol for SDNs
(IEEE, 2020-11-02)Software-Defined Networking (SDN) is a promising networking architecture that enables central management along with network programmability. However, SDN brings additional security threats due to untrusted control and data ... -
Dropout regularization in hierarchical mixture of experts
(Elsevier, 2021-01-02)Dropout is a very effective method in preventing overfitting and has become the go-to regularizer for multi-layer neural networks in recent years. Hierarchical mixture of experts is a hierarchically gated model that defines ...
Share this page