Browsing Computer Science by Title
Now showing items 351-370 of 549
-
-
Networking standards
(IEEE, 2017-03)The article in this special section focus on the market for new networking technologies. Networking technologies are advancing faster than ever before. Aspects driving this change in velocity is the need to support faster, ... -
NFT primary sale price and secondary sale prediction via deep learning
(Association for Computing Machinery, Inc, 2023-11-27)Non Fungible Tokens (NFTs) are blockchain-based unique digital assets defining ownership deeds. They can characterize various different objects such as collectible, art, and in-game items. In general, NFTs are encoded by ... -
Not all mistakes are equal
(The ACM Digital Library, 2020)In many tasks, classifiers play a fundamental role in the way an agent behaves. Most rational agents collect sensor data from the environment, classify it, and act based on that classification. Recently, deep neural networks ... -
Nova: Value-based negotiation of norms
(ACM, 2021-08-01)Specifying a normative multiagent system (nMAS) is challenging, because different agents often have conflicting requirements. Whereas existing approaches can resolve clear-cut conflicts, tradeoffs might occur in practice ... -
A novel GBT-based approach for cross-channel fraud detection on real-world banking transactions
(IEEE, 2022)The most recent research on hundreds of financial institutions uncovered that only 26 % of them have a team assigned to detect cross-channel fraud. Due to the developing technologies, various fraud techniques have emerged ... -
A novel intelligent approach for detecting DoS flooding attacks in software-defined networks
(Universitas Ahmad Dahlan, 2018-03)Software-Defined Networking (SDN) is an emerging networking paradigm that provides an advanced programming capability and moves the control functionality to a centralized controller. This paper proposes a two-stage novel ... -
A novel runtime verification solution for LoT systems
(IEEE, 2018)Internet of Things (IoT) systems promise a seamless connected world with machines integrating their services without human intervention. It's highly probable that the entities participating in such autonomous machine to ... -
NTIRE 2022 challenge on night photography rendering
(IEEE, 2022)This paper reviews the NTIRE 2022 challenge on night photography rendering. The challenge solicited solutions that processed RAW camera images captured in night scenes to produce a photo-finished output image encoded in ... -
NTIRE 2023 challenge on night photography rendering
(IEEE, 2023)This paper presents a review of the NTIRE 2023 challenge on night photography rendering. The goal of the challenge was to find solutions that process raw camera images taken in nighttime conditions conditions, and thereby ... -
Objective and subjective QoE evaluation for adaptive point cloud streaming
(IEEE, 2020-05)Volumetric media has the potential to provide the six degrees of freedom (6DoF) required by truly immersive media. However, achieving 6DoF requires ultra-high bandwidth transmissions, which real-world wide area networks ... -
Observing interoperability of IoT systems through model-based testing
(Springer Nature, 2018)Internet of Things (IoT) has drastically modified the industrial services provided through autonomous machine-to-machine interactions. Such systems comprise of devices manufactured by various suppliers. Verification is a ... -
OCR-aided person annotation and label propagation for speaker modeling in TV shows
(IEEE, 2016)In this paper, we present an approach for minimizing human effort in manual speaker annotation. Label propagation is used at each iteration of an active learning cycle. More precisely, a selection strategy for choosing the ... -
Offloading deep learning powered vision tasks from UAV to 5G edge server with denoising
(IEEE, 2023-06)Offloading computationally heavy tasks from an unmanned aerial vehicle (UAV) to a remote server helps improve battery life and can help reduce resource requirements. Deep learning based state-of-the-art computer vision ... -
On characterizing sectoral interactions via connections between employees in professional online social networks
(Elsevier, 2018-12)The collaboration among individuals is essential to maximize economic efficiency. Today most of the technological and economical advancements require multidisciplinary efforts. Therefore promoting interaction and knowledge ... -
On context-aware DDoS attacks using deep generative networks
(IEEE, 2018-10)Distributed Denial of Service (DDoS) attacks continue to be one of the most severe threats in the Internet. The intrinsic challenge in preventing DDoS attacks is to distinguish them from legitimate flash crowds since two ... -
On spectral analysis of the Internet delay space and detecting anomalous routing paths
(TÜBİTAK, 2019)Latency is one of the most critical performance metrics for a wide range of applications. Therefore, it is important to understand the underlying mechanisms that give rise to the observed latency values and diagnose the ... -
On the co-absence of input terms in higher order neuron representation of boolean functions
(Springer International Publishin, 2017)Boolean functions (BFs) can be represented by using polynomial functions when −1 and +1 are used represent True and False respectively. The coefficients of the representing polynomial can be obtained by exact interpolation ... -
On the use of evolutionary coupling for software architecture recovery
(IEEE, 2021)Software architecture documentation can be partially obtained automatically by means of software architecture recovery tools. These tools mainly cluster software modules to provide a high level structural organization of ... -
On the use of machine learning for predicting defect fix time violations
(Science and Technology Publications, 2022)Accurate prediction of defect fix time is important for estimating and coordinating software maintenance efforts. Likewise, it is useful to predict whether or not the initially estimated defect fix time will be exceeded ...
Share this page