Browsing Computer Science by Title
Now showing items 387-406 of 549
-
Performance evaluation of unfolded sparse matrix-vector multiplication
(2015-01)Sparse matrix-vector multiplication (spMV) is a kernel operation in scientific com- putation. There exist problems where a matrix is repeatedly multiplied by many different vectors. For such problems, specializing the spMV ... -
Performance of the OZU speaker verification systems with the NIST SRE 2010 data in a multi-class scenario
(IEEE, 2012)Konuşmacı doğrulama sistemlerinin başarımı tipik olarak ikili karar mekanizmasına dayanır. Yine de finans şirketlerinin çağrı merkezi gibi 100%’ e yakın kesinlik gerektiren uygulamalarda var olan sistemlerin ikili kararlarına ... -
Persica: A Persian corpus for multi-purpose text mining and natural language processing
(IEEE, 2012)Lack of multi-application text corpus despite of the surging text data is a serious bottleneck in the text mining and natural language processing especially in Persian language. This paper presents a new corpus for NEWS ... -
PL/SQL programları i̇çin veri tabanı bağımlılık analizi
(CEUR-WS, 2017)PL/SQL dili ile yazılan programlar, veri tabanı üzerinde prosedür ve fonksiyon objeleri, ve bu objelerin bir kümesini barındıran paket objeleri olarak geliştirilmektedirler. Bu objeler yoğun olarak tablo ve görünüm gibi ... -
Point of sale Fraud detection methods via machine learning
(IEEE, 2023)Restaurant cash registers frequently experience fraudulent transactions, leading to substantial financial losses for operators. Despite several methods aimed at preventing fraud at the cash register, addressing this issue ... -
Policy conflict resolution in IoT via planning
(Advances in Artificial Intelligence, 2017)With the explosion of connected devices to automate tasks, manually governing interactions among such devices—and associated services—has become an impossible task. This is because devices have their own obligations and ... -
Postprocessing synthetic speech with a complex cepstrum vocoder for spoofing phase-based synthetic speech detectors
(IEEE, 2017-06)State-of-the-art speaker verification systems are vulnerable to spoofing attacks. To address the issue, high-performance synthetic speech detectors (SSDs) for existing spoofing methods have been proposed. Phase-based SSDs ... -
Predicting shuttle arrival time in istanbul
(Springer Nature, 2020)Nowadays, transportation companies look for smart solutions in order to improve quality of their services. Accordingly, an intercity bus company in Istanbul aims to improve their shuttle schedules. This paper proposes ... -
Prediction of active UE number with Bayesian neural networks for self-organizing LTE networks
(IEEE, 2017-01-01)Internet-empowered electronic gadgets and content rich multimedia applications have expanded exponentially in recent years. As a consequence, heterogeneous network structures introduced with Long Term Evolution (LTE) ... -
Preface
(2011) -
Preface
(Springer International Publishing, 2016)The pervasiveness of open systems raises a range of challenges and opportunities for research and technological development in the area of autonomous agents and multi-agent systems. Open systems comprise loosely coupled ... -
-
-
-
Prioritization and parallel execution of test cases for certification testing of embedded systems
(Springer, 2022-07-22)Testing for certification of embedded systems is common in consumer electronics domain. Application vendors provide test suites that have to be repeatedly executed for each product. Multiple test stations can be used in ... -
Prioritization of test cases with varying test costs and fault severities for certification testing
(IEEE, 2020-10)We present an industrial case study on the application of test case prioritization techniques in the context of certification testing in consumer electronics domain. Test execution times and fault severities are subject ... -
Privacy enforcement through policy extension
(IEEE, 2016)Successful coalition operations require contributions from the coalition partners which might have hidden goals and desiderata in addition to the shared coalition goals. Therefore, there is an inevitable risk-utility ... -
Probabilistic logic programming with beta-distributed random variables
(Association for the Advancement of Artificial Intelligence, 2019-07-17)We enable aProbLog-a probabilistic logical programming approach-to reason in presence of uncertain probabilities represented as Beta-distributed random variables. We achieve the same performance of state-of-the-art algorithms ... -
ProbC: joint modeling of epigenome and transcriptome effects in 3D genome
(BioMed Central Ltd, 2022-12)Background: Hi-C and its high nucleosome resolution variant Micro-C provide a window into the spatial packing of a genome in 3D within the cell. Even though both techniques do not directly depend on the binding of specific ... -
Processing nested complex sequence pattern queries over event streams
(ACM, 2010)Complex event processing (CEP) has become increasingly important for tracking and monitoring applications ranging from healthcare, supply chain management to surveillance. These monitoring applications submit complex event ...
Share this page