Browsing Computer Science by Title
Now showing items 209-228 of 549
-
Formal modelling and verification of a multi-agent negotiation approach for airline operations control
(Springer, 2021-02-12)This paper proposes and evaluates a new airline disruption management strategy using multi-agent system modelling, simulation, and verification. This new strategy is based on a multi-agent negotiation protocol and is ... -
FORMAT: a tool for adapting test models based on feature models
(IEEE, 2017)We introduce a tool that facilitates the reuse of test models for a family of systems. Test models are defined as hierarchical Markov chains for specifying possible usage of features for these systems. Variability among ... -
FPGA bitstream protection with PUFs, obfuscation, and multi-boot
(IEEE, 2011)With the combination of PUFs, obfuscation, and multi-boot, we are able to do the equivalent of partial bitstream encryption on low-cost FPGAs, which is only featured on high-end FPGAs. Low-cost FPGAs do not even have ... -
FPGA implementation of a dense optical flow algorithm using altera openCL SDK
(Springer International Publishing, 2017)FPGA acceleration of compute-intensive algorithms is usually not regarded feasible because of the long Verilog or VHDL RTL design efforts they require. Data-parallel algorithms have an alternative platform for acceleration, ... -
FrameForm: An open-source annotation interface for framenet
(Association for Computational Linguistics (ACL), 2021)In this paper, we introduce FrameForm1, an open-source annotation tool designed to accommodate predicate annotations based on Frame Semantics (Fillmore et al., 1976). FrameForm is a user-friendly tool for creating, annotating ... -
A framework for adaptive delivery of omnidirectional video
(Society for Imaging Science and Technology, 2018)Omnidirectional or 360-degree videos are considered as a next step towards a truly immersive media experience. Such videos allow the user to change her/his viewing direction while consuming the video. The download-and-play ... -
From capturing to rendering: Volumetric media delivery with six degrees of freedom
(IEEE, 2020-10)Technological improvements are rapidly advancing holographic-type content distribution. Significant research efforts have been made to meet the low latency and high bandwidth requirements set forward by interactive ... -
From constituency to UD-Style dependency: Building the first conversion tool of Turkish
(Incoma Ltd, 2021-09)This paper deliberates on the process of building the first constituency-to-dependency conversion tool of Turkish. The starting point of this work is a previous study in which 10,000 phrase structure trees were manually ... -
Fully autonomous trustworthy unmanned aerial vehicle teamwork: A research guideline using level 2 blockchain
(IEEE, 2023-02)The vast range of possible fully autonomous multiunmanned aerial vehicle (multi-UAV) operations is creating a new and expanding market where technological advances are happening at a breakneck pace. The integration of UAVs ... -
FUSE-BEE: Fusion of subjective opinions through behavior estimation
(IEEE, 2015)Information is critical in almost all decision making processes. Therefore, it is important to get the right information at the right time from the right sources. However, information sources may behave differently while ... -
Game of protocols: Is QUIC ready for prime time streaming?
(Wiley, 2020-05)Quick User Datagram Protocol (UDP) Internet Connections (QUIC) is an experimental and low-latency transport protocol proposed by Google, which is still being improved and specified in the Internet Engineering Task Force ... -
Game of streaming players: Is consensus viable or an illusion?
(Association for Computing Machinery, Inc, 2019-08)The dramatic growth of HTTP adaptive streaming (HAS) traffic represents a practical challenge for service providers in satisfying the demand from their customers. Achieving this in a network where multiple players share ... -
Game theory based bitrate adaptation for Dash.Js reference player
(IEEE, 2018-11-28)Most existing DASH adaptive bitrate (ABR) schemes are designed to behave in their own self-interest and do not perform consistently in all network environments. In this work, we provide a practical implementation, materials ... -
Gauss karışım modeli tabanlı konuşmacı belirleme sistemlerinde klasik MAP uyarlanması yönteminin performans analizi
(IEEE, 2010)Gaussian mixture models (GMM) is one of the most commonly used methods in text-independent speaker identification systems. In this paper, performance of the GMM approach has been measured with different parameters and ... -
Gauss karışım modeli tabanlı konuşmacı doğrulama sistemlerinde kişiye ve kanala uyarlanmada klasik MAP tabanlı yöntemlerin performans analizi
(IEEE, 2011)In this paper, performance of Gaussian mixture models (GMM) based algorithms implemented in Speech Processing Laboratory at Ozyegin University, within NIST SRE2004 and 2006 database was reported. Gaussian mixture models ... -
Geçmişe dönük hata tespit oranlarının zamanla değişen etkisine göre regresyon testlerinin önceliklendirilmesi
(CEUR-WS, 2014)Büyük ölçekli yazılım sistemlerinin regresyon testleri masraflıdır. Kaynak kısıtları sebebiyle genellikle tüm test durumlarını değerlendirmek mümkün olmamaktadır. Dolayısıyla, hataları mümkün olan en kısa sürede tespit ... -
A general-purpose protocol for multi-agent based explanations
(Springer, 2023)Building on prior works on explanation negotiation protocols, this paper proposes a general-purpose protocol for multi-agent systems where recommender agents may need to provide explanations for their recommendations. The ... -
Generalization to unseen viewpoint images of objects via alleviated pose attentive capsule agreement
(Springer, 2023-02)Despite their achievements in object recognition, Convolutional Neural Networks (CNNs) particularly fail to generalize to unseen viewpoints of a learned object even with substantial samples. On the other hand, recently ... -
A generalized stereotype learning approach and its instantiation in trust modeling
(Elsevier, 2018-08)Owing to the lack of historical data regarding an entity in online communities, a user may rely on stereotyping to estimate its behavior based on historical data about others. However, these stereotypes cannot accurately ... -
Generating runtime verification specifications based on static code analysis alerts
(ACM, 2017)Runtime verification techniques verify dynamic system behavior with respect to a set of specifications. These specifications are often created manually based on system requirements and constraints. In this paper, we introduce ...
Share this page