Browsing Computer Science by Title
Now showing items 420-439 of 549
-
Reasoning under uncertainty: variations of subjective logic deduction
(IEEE, 2013)This work develops alternatives to the classical subjective logic deduction operator. Given antecedent and consequent propositions, the new operators form opinions of the consequent that match the variance of the consequent ... -
Reasoning with uncertain information and trust
(SPIE, 2013)A limitation of standard Description Logics is its inability to reason with uncertain and vague knowledge. Although probabilistic and fuzzy extensions of DLs exist, which provide an explicit representation of uncertainty, ... -
Redundant encoding and packaging for segmented live media
(ACM, 2023-06-16)We present the MPEG standardization activity on redundant encoding and packaging for live segmented media. The standardization includes profiling the Dynamic Adaptive Streaming over HTTP (DASH) Media Presentation Description ... -
Referanssız görüntü bloklanma ölçümü için yeni bir yöntem
(IEEE, 2014)Internet’te ve servis sağlayıcı ağlarında video trafiğinin tavan yaptığı günümüzde otomatik görüntü kalitesi ölçümünün faydaları aşikardır. Bu ölçümlerin birçok uygulamada gerçekzamanlı yapılması gerekir ve de bu “Referanssız” ... -
Reinforcement learning to adjust parametrized motor primitives to new situations
(Springer Science+Business Media, 2012-11)Humans manage to adapt learned movements very quickly to new situations by generalizing learned behaviors from similar situations. In contrast, robots currently often need to re-learn the complete movement. In this paper, ... -
Relating Staged Computation to the Record Calculus
(Özyeğin University, 06.09.2010)It has been previously shown that there is a close relation between record calculus and program generation (e.g. Lisp-like quasiquotations): A translation has been defined to convert staged expressions to record calculus ... -
Reproducing failures based on semiformal failure scenario descriptions
(Springer International Publishing, 2017)Due to the increasing size and complexity of software systems, it becomes hard to test these systems exhaustively. As a result, some faults can be left undetected. Undetected faults can lead to failures in deployed systems. ... -
Reputation mechanism for e-commerce in virtual reality environments
(Elsevier, 2014)The interest in 3D technology and virtual reality (VR) is growing both from academia and industry, promoting the quick development of virtual marketplaces (VMs) (i.e. e-commerce systems in VR environments). VMs have inherited ... -
Results of the first annual human-agent league of the automated negotiating agents competition
(The ACM Digital Library, 2018)We present the results of the first annual Human-Agent League of ANAC. By introducing a new human-agent negotiating platform to the research community at large, we facilitated new advancements in human-aware agents. This ... -
Rethinking frequency opponent modeling in automated negotiation
(Springer International Publishing, 2017)Frequency opponent modeling is one of the most widely used opponent modeling techniques in automated negotiation, due to its simplicity and its good performance. In fact, it outperforms even more complex mechanisms like ... -
Reversing image signal processors by reverse style transferring
(Springer, 2023)RAW image datasets are more suitable than the standard RGB image datasets for the ill-posed inverse problems in low-level vision, but not common in the literature. There are also a few studies to focus on mapping sRGB ... -
Risk-driven model-based testing of washing machine software: an industrial case study
(IEEE, 2018-07-16)We previously introduced an approach for risk-driven model-based testing. In that approach, test models are represented in the form of Markov chains and test case generation is steered by state transition probabilities. ... -
Road to salvation: Streaming clients and content delivery networks working together
(IEEE, 2021-11-01)Streaming media has truly become one of the most popular applications on the Internet. Viewers are spoiled for choice, and content providers compete to provide the best viewer experience. Traditionally, it has been challenging ... -
Robotic grasping and manipulation through human visuomotor learning
(Elsevier, 2012-03)A major goal of robotics research is to develop techniques that allow non-experts to teach robots dexterous skills. In this paper, we report our progress on the development of a framework which exploits human sensorimotor ... -
A robotics summer camp for high school students: pipelines activities promoting careers in engineering fields
(American Society for Engineering Education, 2013-06)In this paper we discuss the lived-experiences and the career interests of 27 high school students who participated in a two-week Robotics summer camp in 2012. The summer camp was designed by a team of engineering faculty, ... -
Routing-aware partitioning of the internet address space for server ranking in CDNs
(Elsevier, 2017-07)The goal of Content Delivery Networks (CDNs) is to serve content to end-users with high performance. In order to do that, a CDN measures the latency on the paths from its servers to users and then selects a best available ... -
Rumadai: A plug-in to record and replay client-side events of web sites with dynamic content
(IEEE, 2012)Reproducing user events when testing web pages is challenging because of the dynamic nature of the web content and potential dependency on third party content providers. We present Rumadai, a Visual Studio plug-in, that ... -
A run-time verification framework for smart grid applications implemented on simulation frameworks
(IEEE, 2013)Smart grid applications are implemented and tested with simulation frameworks as the developers usually do not have access to large sensor networks to be used as a test bed. The developers are forced to map the implementation ... -
Runtime verification of component-based embedded software
(Springer, 2011)To deal with increasing size and complexity, component-based software development has been employed in embedded systems. Due to several faults, components can make wrong assumptions about the working mode of the system and ... -
Runtime verification of Iot systems using complex event processing
(IEEE, 2017)Internet of Things (IoT) is a new computing paradigm that is proliferated by wide adoption of application level protocols such as MQTT and CoAP, each of which defines different styles of sequential interaction of events. ...
Share this page