Browsing Computer Science by Title
Now showing items 276-295 of 549
-
Increasing test efficiency by risk-driven model-based testing
(Elsevier, 2018-10)We introduce an approach and a tool, RIMA, for adapting test models used for model-based testing to augment information regarding failure risk. We represent test models in the form of Markov chains. These models comprise ... -
Incremental analysis of large-scale system logs for anomaly detection
(IEEE, 2019)Anomalies during system execution can be detected by automated analysis of logs generated by the system. However, large scale systems can generate tens of millions of lines of logs within days. Centralized implementations ... -
Inference management, trust and obfuscation principles for quality of information in emerging pervasive environments
(Elsevier, 2014-04)The emergence of large scale, distributed, sensor-enabled, machine-to-machine pervasive applications necessitates engaging with providers of information on demand to collect the information, of varying quality levels, to ... -
Inferring cost functions using reward parameter search and policy gradient reinforcement learning
(IEEE, 2021)This study focuses on inferring cost functions of obtained movement data using reward parameter search and policy gradient based Reinforcement Learning (RL). The behavior data for this task is obtained through a series of ... -
Inferring human values for safe AGI design
(Springer International Publishing, 2015)Aligning goals of superintelligent machines with human values is one of the ways to pursue safety in AGI systems. To achieve this, it is first necessary to learn what human values are. However, human values are incredibly ... -
InfraGAN: A GAN architecture to transfer visible images to infrared domain
(Elsevier, 2022-03)Utilizing both visible and infrared (IR) images in various deep learning based computer vision tasks has been a recent trend. Consequently, datasets having both visible and IR image pairs are desired in many applications. ... -
Instagram filter removal on fashionable images
(IEEE, 2021-06)Social media images are generally transformed by filtering to obtain aesthetically more pleasing appearances. However, CNNs generally fail to interpret both the image and its filtered version as the same in the visual ... -
Integrated static code analysis and runtime verification
(Wiley, 2015-10)Static code analysis tools automatically generate alerts for potential software faults that can lead to failures. However, these tools usually generate a very large number of alerts, some of which are subject to false ... -
Interest-based negotiation for policy-regulated asset sharing
(Springer Nature, 2016)Resources sharing is an important but complex problem to be solved. The problem is exacerbated in a coalition context due to policy constraints, that reflect concerns regarding security, privacy and performance to name a ... -
Interplay between neural computational energy and multimodal processing in robot-robot interaction
(IEEE, 2023)Multimodal learning is an active research area that is gaining importance in human-robot interaction. Despite the obvious benefit of levering multiple sensors for perceiving the world, its neural computational cost has not ... -
Interpretability of deep learning models: a survey of results
(IEEE, 2018-06-26)Deep neural networks have achieved near-human accuracy levels in various types of classification and prediction tasks including images, text, speech, and video data. However, the networks continue to be treated mostly as ... -
INTERSPEECH 2009 duygu tanıma yarışması değerlendirmesi
(IEEE, 2010)Bu makalede INTERSPEECH 2009 Duygu Tanıma Yarışması sonuçlarını değerlendiriyoruz. Yarışmanın sunduğu problem doğal ve duygu bakımından zengin FAU Aibo konuşma kayıtlarının beş ve iki duygu sınıfına en doğru şekilde ... -
Introducing StarDust: A UD-based Dependency Annotation Tool
(European Language Resources Association (ELRA), 2022)This paper aims to introduce StarDust, a new, open-source annotation tool designed for NLP studies. StarDust is designed specifically to be intuitive and simple for the annotators while also supporting the annotation of ... -
Introduction of a spatio-temporal mapping based POE method for outdoor spaces: Suburban university campus as a case study
(Elsevier, 2018-11)Outdoor spaces are important to sustainable cities because they establish a common identity for social life by improving quality of urban living. The relation between outdoor spaces and building groups, competency, use ... -
An introduction to the pocket negotiator: a general purpose negotiation support system
(Springer International Publishing, 2017)The Pocket Negotiator (PN) is a negotiation support system developed at TU Delft as a tool for supporting people in bilateral negotiations over multi-issue negotiation problems in arbitrary domains. Users are supported in ... -
Joint modeling of histone modifications in 3D genome shape through Hi-C interaction graph
(Springer, 2021)Chromosome conformation capture experiments such as Hi-C are used to map the three-dimensional spatial organization of genomes. Even though Hi-C interactions are not biased towards any of the histone modifications, previous ... -
A journey towards fully immersive media access
(2019)Universal media access (UMA) as proposed almost two decades ago is now reality. We can generate, distribute, share, and consume any media content, anywhere, anytime, and with/on any device. A technical breakthrough was the ... -
A knowledge driven policy framework for internet of things
(ScitePress, 2017)With the proliferation of technology, connected and interconnected devices (henceforth referred to as IoT) are fast becoming a viable option to automate the day-to-day interactions of users with their environment—be it ... -
Kombi̇natoryal test tekni̇kleri̇ni̇n karmaşık olay i̇şleme motorlarında uygulanması
(IEEE, 2012)Testing practice has a critical place during the design, implementation and integration of software, hardware and complex systems composed of these. Cost of failures caused by bugs that could not be detected and fixed early ... -
Konuşmacı aradeğerlemeli SMM tabanlı metinden konuşma sentezleme si̇stemi
(IEEE, 2011)Hidden Markov Model (HMM) based text-to-speech (TTS) systems offer many advantages compared to the concatenative approach. One of those advantages is the ability to interpolate between different speakers to generate new ...
Share this page