Browsing Computer Science by Title
Now showing items 431-450 of 549
-
Risk-driven model-based testing of washing machine software: an industrial case study
(IEEE, 2018-07-16)We previously introduced an approach for risk-driven model-based testing. In that approach, test models are represented in the form of Markov chains and test case generation is steered by state transition probabilities. ... -
Road to salvation: Streaming clients and content delivery networks working together
(IEEE, 2021-11-01)Streaming media has truly become one of the most popular applications on the Internet. Viewers are spoiled for choice, and content providers compete to provide the best viewer experience. Traditionally, it has been challenging ... -
Robotic grasping and manipulation through human visuomotor learning
(Elsevier, 2012-03)A major goal of robotics research is to develop techniques that allow non-experts to teach robots dexterous skills. In this paper, we report our progress on the development of a framework which exploits human sensorimotor ... -
A robotics summer camp for high school students: pipelines activities promoting careers in engineering fields
(American Society for Engineering Education, 2013-06)In this paper we discuss the lived-experiences and the career interests of 27 high school students who participated in a two-week Robotics summer camp in 2012. The summer camp was designed by a team of engineering faculty, ... -
Routing-aware partitioning of the internet address space for server ranking in CDNs
(Elsevier, 2017-07)The goal of Content Delivery Networks (CDNs) is to serve content to end-users with high performance. In order to do that, a CDN measures the latency on the paths from its servers to users and then selects a best available ... -
Rumadai: A plug-in to record and replay client-side events of web sites with dynamic content
(IEEE, 2012)Reproducing user events when testing web pages is challenging because of the dynamic nature of the web content and potential dependency on third party content providers. We present Rumadai, a Visual Studio plug-in, that ... -
A run-time verification framework for smart grid applications implemented on simulation frameworks
(IEEE, 2013)Smart grid applications are implemented and tested with simulation frameworks as the developers usually do not have access to large sensor networks to be used as a test bed. The developers are forced to map the implementation ... -
Runtime verification of component-based embedded software
(Springer, 2011)To deal with increasing size and complexity, component-based software development has been employed in embedded systems. Due to several faults, components can make wrong assumptions about the working mode of the system and ... -
Runtime verification of Iot systems using complex event processing
(IEEE, 2017)Internet of Things (IoT) is a new computing paradigm that is proliferated by wide adoption of application level protocols such as MQTT and CoAP, each of which defines different styles of sequential interaction of events. ... -
Sampling-free variational inference of bayesian neural networks by variance backpropagation
(ML Research Press, 2020)We propose a new Bayesian Neural Net formulation that affords variational inference for which the evidence lower bound is analytically tractable subject to a tight approximation. We achieve this tractability by (i) decomposing ... -
Sampling-free variational inference of Bayesian neural networks by variance backpropagation
(Association For Uncertainty in Artificial Intelligence (AUAI), 2019)We propose a new Bayesian Neural Net formulation that affords variational inference for which the evidence lower bound is analytically tractable subject to a tight approximation. We achieve this tractability by (i) decomposing ... -
SAS : A speaker verification spoofing database containing diverse attacks
(IEEE, 2015)This paper presents the first version of a speaker verification spoofing and anti-spoofing database, named SAS corpus. The corpus includes nine spoofing techniques, two of which are speech synthesis, and seven are voice ... -
SDNHAS: An SDN-Enabled architecture to optimize qoe in http adaptive streaming
(IEEE, 2017-10)HTTP adaptive streaming (HAS) is receiving much attention from both industry and academia as it has become the de facto approach to stream media content over the Internet. Recently, we proposed a streaming architecture ... -
SeCaS: Secure capability sharing framework for IoT devices in a structured P2P network
(The ACM Digital Library, 2020-03-16)The emergence of the internet of Things (IoT) has resulted in the possession of a continuously increasing number of highly heterogeneous connected devices by the same owner. To make full use of the potential of a personal ... -
Self-discovery of motor primitives and learning grasp affordances
(IEEE, 2012)Human infants practice their initial, seemingly random arm movements for transforming them into voluntary reaching and grasping actions. With the developing perceptual abilities, infants further explore their environment ... -
Semantic reasoning with uncertain information from unreliable sources
(Springer International Publishing, 2016)Intelligent software agents may significantly benefit from semantic reasoning. However, existing semantic reasoners are based on Description Logics, which cannot handle vague, incomplete, and unreliable knowledge. In this ... -
Sequential decision making based on emergent emotion for a humanoid robot
(IEEE, 2017)Certain emotions and moods can be manifestations of complex and costly neural computations that our brain wants to avoid. Instead of reaching an optimal decision based on the facts, we find it often easier and sometimes ... -
Sesli̇ yanıt si̇stemi̇ çaǧrı akışında di̇lbi̇lgi̇si̇ tabanlı Türkçe konuşma tanıma si̇stemi̇ tanıtımı
(IEEE, 2012)Bu bildiride, çağrı merkezleri için kullanılan sesli yanıt sisteminde dilbilgisi-tabanlı Türkçe konuşma tanıma sistemi anlatılmaktadır. Yapılan çalışmada bir telekomünikasyon kurumunun çağrı merkezi sisteminin örneklemesi ... -
Seyrek matris-vektör çarpımı için koşut zamanda özelleşmi̇ş kod üreti̇mi̇ ve deneysel opti̇mi̇zasyon
(IEEE, 2012)Bu çalışmada seyrek matris-vektor çarpımı için matris içeriğine göre özelleşmiş, yüksek hızlı program üretimi yapan bir kütüphane tasarımı anlatılmaktadır. Kütüphane sinyal işleme uygulamaları, bilimsel hesaplamalar, sonlu ... -
SHACL constraints with inference rules
(Springer Nature, 2019)The Shapes Constraint Language (SHACL) has been recently introduced as a W3C recommendation to define constraints that can be validated against RDF graphs. Interactions of SHACL with other Semantic Web technologies, such ...
Share this page