Browsing Computer Science by Title
Now showing items 460-479 of 549
-
Smart job scheduling for high-performance cloud computing services
(Civil-comp, 2011-01)In this paper, we describe the challenges faced and lessons learned while establishing a large-scale high performance cloud computing service that enables online mechanical structural analysis and many other scientific ... -
SOBE: Source behavior estimation for subjective opinions In multiagent systems
(International Foundation for Autonomous Agents and Multiagent Systems (IFAAMAS), 2016)In cooperative or hostile environments, agents communicate their subjective opinions about various phenomenon. However, sources of these opinions may not always be competent and honest but more likely erroneous or even ... -
Software UART: A use case for VSCPU worst-case execution time analyzer
(IEEE, 2019)This paper presents our early results of the development of a Worst-Case Execution Time (WCET) analyzer for VSCPU by implementing a software UART system. Our WCET analyzer takes a C program as input and gives the time taken ... -
Solver agent: Towards emotional and opponent-aware agent for human-robot negotiation
(International Foundation for Autonomous Agents and Multiagent Systems (IFAAMAS), 2021)Negotiation is one of the crucial processes for resolving conflicts between parties. In automated negotiation, agent designers mostly take opponent's offers and the remaining time into account while designing their strategies. ... -
Sorec: Self-organizing and resource efficient clustered blockchain network
(Elsevier, 2023-09)With the emergence of Industry 4.0, the features of the technologies that are utilized in broad range of areas are obliged to change according to the new necessities. Especially, the network requirements have to be adopted ... -
Source behavior discovery for fusion of subjective opinions
(IEEE, 2016)Information is at the center of decision making in many systems and use-cases. In cooperative or hostile environments, agents communicate their subjective opinions about various phenomenon. However, sources of these opinions ... -
A sparse matrix‐vector multiplication method with low preprocessing cost
(Wiley, 2018-11-10)Sparse matrix-vector multiplication (SpMV) is a crucial operation used for solving many engineering and scientific problems. In general, there is no single SpMV method that gives high performance for all sparse matrices. ... -
Spectrum-based fault localization for diagnosing concurrency faults
(Springer Science+Business Media, 2013)Concurrency faults are activated by specific thread interleavings at runtime. Traditional fault localization techniques and static analysis fall short to diagnose these faults efficiently. Existing dynamic fault-localization ... -
Spending "quality"' time with the web video
(IEEE, 2016)For consumers, watching video over the Web is the most popular way to access free and premium content on connected devices. The underlying technology -- HTTP adaptive streaming -- is straightforward; however, due to quality ... -
Spoofing attacks to i-vector based voice verification systems using statistical speech synthesis with additive noise and countermeasure
(IEEE, 2016)Even though improvements in the speaker verification (SV) technology with i-vectors increased their real-life deployment, their vulnerability to spoofing attacks is a major concern. Here, we investigated the effectiveness ... -
Spoofing voice verification systems with statistical speech synthesis using limited adaptation data
(Elsevier, 2017-03)State-of-the-art speaker verification systems are vulnerable to spoofing attacks using speech synthesis. To solve the issue, high-performance synthetic speech detectors (SSDs) for attack methods have been proposed recently. ... -
Stage: stereotypical trust assessment through graph extraction
(Wiley, 2016-02)Bootstrapping trust assessment where there is little or no evidence regarding a subject is a significant challenge for existing trust and reputation systems. When direct or indirect evidence is absent, existing approaches ... -
Staged development of robot skills: behavior formation, affordance learning and imitation
(IEEE, 2015-06)Inspired by infant development, we propose a three staged developmental framework for an anthropomorphic robot manipulator. In the first stage, the robot is initialized with a basic reach-and- enclose-on-contact movement ... -
Static analysis of multi-staged programs via unstaging translation
(ACM, 2011)Static analysis of multi-staged programs is challenging because thebasic assumption of conventional static analysis no longer holds: the program text itself is no longer a fixed static entity, but rather a dynamically ... -
Statik ve dinamik analizler ile hesaplanan risklere dayalı olarak test modellerinin iyileştirilmesi
(CEUR, 2015)Model bazlı test teknikleri, sistem kullanım modelinden test senaryolarının otomatik olarak oluşturulmasını sağlayarak verimliliği artırmaktadır. Prensip olarak sonsuz sayıda test senaryosu oluşturmak mümkündür; ancak bu ... -
Strategies for truth discovery under resource constraints
(ACM, 2015)We present a decision-theoretic approach for sampling information sources in resource-constrained environments, where there is uncertainty regarding source trustworthiness. We exploit diversity among sources to stratify ... -
Stream analytics and adaptive windows for operational mode identification of time-varying industrial systems
(IEEE, 2018-09-07)It is necessary to develop accurate, yet simple and efficient models that can be used with high-speed industrial data streams. In this paper, we develop a mode identification technique using stream analytics and show that ... -
Streaming multicast video over software-defined networks
(IEEE, 2014)Many of the video streaming applications in today's Internet involve the distribution of content from a CDN source to a large population of interested clients. However, widespread support of IP multicast is unavailable due ... -
Studying green video distribution as a whole
(ACM, 2023-06-09)This paper highlights the current trends and the necessary research directions for achieving carbon-effective streaming services. Collaboration between the end-to-end delivery pipeline vendors is encouraged to design ... -
Subjective bayesian networks and human-in-the-loop situational understanding
(Springer, 2018-03-21)In this paper we present a methodology to exploit human-machine coalitions for situational understanding. Situational understanding refers to the ability to relate relevant information and form logical conclusions, as well ...
Share this page