Browsing Computer Science by Title
Now showing items 129-148 of 549
-
Detection of malicious social bots: A survey and a refined taxonomy
(Elsevier, 2020-08-01)Social hots represent a new generation of hots that make use of online social networks (OSNs) as command and control (C&C) channels. Malicious social hots have been used as tools for launching large-scale spam campaigns, ... -
Deterministic neural illumination mapping for efficient auto-white balance correction
(IEEE, 2023)Auto-white balance (AWB) correction is a critical operation in image signal processors for accurate and consistent color correction across various illumination scenarios. This paper presents a novel and efficient AWB ... -
Developmental scaffolding with large language models
(IEEE, 2023)Exploration and self-observation are key mechanisms of infant sensorimotor development. These processes are further guided by parental scaffolding to accelerate skill and knowledge acquisition. In developmental robotics, ... -
DiBLIoT: A distributed blacklisting protocol for iot device classification using the hashgraph consensus algorithm
(IEEE Computer Society, 2022)Industrial applications require highly reliable, secure, low-power and low-delay communications. However, wireless communication links in the industrial environment suffer from various channel impairments which can compromise ... -
DILAF: A framework for distributed analysis of large-scale system logs for anomaly detection
(Wiley, 2019-02)System logs constitute a rich source of information for detection and prediction of anomalies. However, they can include a huge volume of data, which is usually unstructured or semistructured. We introduce DILAF, a framework ... -
Discovering frequent patterns to bootstrap trust
(Springer International Publishing, 2013)When a new agent enters to an open multiagent system, bootstrapping its trust becomes a challenge because of the lack of any direct or reputational evidence. To get around this problem, existing approaches assume the same ... -
Discovering predictive relational object symbols with symbolic attentive layers
(IEEE, 2024-02-01)In this letter, we propose and realize a new deep learning architecture for discovering symbolic representations for objects and their relations based on the self-supervised continuous interaction of a manipulator robot ... -
Disentangling human trafficking types and the identification of pathways to forced labor and sex: an explainable analytics approach
(Springer, 2023-07)Terms such as human trafficking and modern-day slavery are ephemeral but reflect manifestations of oppression, servitude, and captivity that perpetually have threatened the basic right of all humans. Operations research ... -
A distributed approach for bitrate selection in HTTP adaptive streaming
(ACM, 2018)Past research has shown that concurrent HTTP adaptive streaming (HAS) players behave selfishly and the resulting competition for shared resources leads to underutilization or oversubscription of the network, presentation ... -
Distributed decision trees
(Springer, 2022)In a budding tree, every node is part internal node and part leaf. This allows representing the tree in a continuous parameter space and training it with backpropagation, like a neural network. Unlike a traditional tree ... -
DNN-based speaker-adaptive postfiltering with limited adaptation data for statistical speech synthesis systems
(IEEE, 2019)Deep neural networks (DNNs) have been successfully deployed for acoustic modelling in statistical parametric speech synthesis (SPSS) systems. Moreover, DNN-based postfilters (PF) have also been shown to outperform conventional ... -
Do not predict – Recompute! How value recomputation can truly boost the performance of invisible speculation
(IEEE, 2021)Recent architectural approaches that address speculative side-channel attacks aim to prevent software from exposing the microarchitectural state changes of transient execution. The Delay-on-Miss technique is one such ... -
DPSec: A blockchain-based data plane authentication protocol for SDNs
(IEEE, 2020-11-02)Software-Defined Networking (SDN) is a promising networking architecture that enables central management along with network programmability. However, SDN brings additional security threats due to untrusted control and data ... -
Dropout regularization in hierarchical mixture of experts
(Elsevier, 2021-01-02)Dropout is a very effective method in preventing overfitting and has become the go-to regularizer for multi-layer neural networks in recent years. Hierarchical mixture of experts is a hierarchically gated model that defines ... -
Dual camera based high spatio-temporal resolution video generation for wide area surveillance
(IEEE, 2022)Wide area surveillance (WAS) requires high spatiotemporal resolution (HSTR) video for better precision. As an alternative to expensive WAS systems, low-cost hybrid imaging systems can be used. This paper presents the usage ... -
Dynamic CDN switching - dash-if content steering in dash.js
(ACM, 2023-06-16)This paper overviews the content steering specification currently being developed in DASH Industry Forum and first implemented in the dash.js reference player. -
Dynamic filtering and prioritization of static code analysis alerts
(IEEE, 2021)We propose an approach for filtering and prioritizing static code analysis alerts while these alerts are being reviewed by the developer. We construct a Prolog knowledge base that captures the data flow information in the ... -
Dynamic load management for IMS networks using network function virtualization
(IEEE, 2016)Network Function Virtualization (NFV) is utilized to simplfy the deployment and management of constantly evolving and highly complex networking services. In this paper, we propose a dynamic load management framework for ... -
Dynamic movement primitives for human movement recognition
(IEEE, 2015)Dynamic Movement Primitives (DMPs)-originally a method for movement trajectory generation [1] has been also used for recognition tasks [2, 3]. However there has not been a systematic comparison between other recognition ... -
E-Cube: multi-dimensional event sequence analysis using hierarchical pattern query sharing
(ACM, 2011-06-12)Many modern applications, including online financial feeds, tag-based mass transit systems and RFID-based supply chain management systems transmit real-time data streams. There is a need for event stream processing technology ...
Share this page