Browsing Computer Science by Title
Now showing items 89-108 of 549
-
A comparison of topologically associating domain callers over mammals at high resolution
(BioMed Central Ltd, 2022-04-12)Background: Topologically associating domains (TADs) are locally highly-interacting genome regions, which also play a critical role in regulating gene expression in the cell. TADs have been first identified while investigating ... -
A complex adaptive system of systems approach to human–automation interaction in smart grid
(Wiley, 2015)This chapter expresses three cognitive genres: descriptive genre, normative/prescriptive genre, and know-how genre. The descriptive genre introduces and discusses on the following disciplines: the core concepts of complexity, ... -
Composing domain-specific physical models with general-purpose software modules in embedded control software
(Springer Science+Business Media, 2014-02)A considerable portion of software systems today are adopted in the embedded control domain. Embedded control software deals with controlling a physical system, and as such models of physical characteristics become part ... -
A computer science-oriented approach to introduce quantum computing to a new audience
(IEEE, 2022-02)Contribution: In this study, an alternative educational approach for introducing quantum computing to a wider audience is highlighted. The proposed methodology considers quantum computing as a generalized probability theory ... -
Conflict resolution in decision making - Second international workshop, COREDEMA 2016, The Hague, The Netherlands, August 29-30, 2016, Revised Selected Papers
(Springer International Publishing, 2017) -
Conflict-based negotiation strategy for human-agent negotiation
(Springer, 2023-12)Day by day, human-agent negotiation becomes more and more vital to reach a socially beneficial agreement when stakeholders need to make a joint decision together. Developing agents who understand not only human preferences ... -
Constrained min-cut replication for k-way hypergraph partitioning
(Informs, 2014)Replication is a widely-used technique in information retrieval and database systems for providing fault tolerance and reducing parallelization and processing costs. Combinatorial models based on hypergraph partitioning ... -
Consumer communications and the next generation broadcast networks
(IEEE, 2016)Over 20 years ago the challenge for the communications community was the convergence between networking, telecommunication, and broadcasting. This challenge has been fairly well met, and we now note that around the world ... -
Content-aware playback speed control for low-latency live streaming of sports
(The ACM Digital Library, 2021)There are two main factors that determine the viewer experience during the live streaming of sports content: latency and stalls. Latency should be low and stalls should not occur. Yet, these two factors work against each ... -
Continual learning for affective robotics: A proof of concept for wellbeing
(IEEE, 2022)Sustaining real-world human-robot interactions re-quires robots to be sensitive to human behavioural idiosyn-crasies and adapt their perception and behaviour models to cater to these individual preferences. For affective ... -
Cooperation and trust in the presence of bias
(2014)Stereotypes may influence the attitudes that individuals have towards others. Stereotypes, therefore, represent biases toward and against others. In this paper, we formalise stereotypical bias within trust evaluations. ... -
Cooperative multi-task assignment for heterogonous UAVs
(IEEE, 2015)This research is focused on the cooperative multi-task assignment problem for heterogeneous UAVs, where a set of multiple tasks, each requiring a predetermined number of UAVs, have to be completed at specific locations. ... -
COSMOS on steroids: a Cheap detector for cheapfakes
(The ACM Digital Library, 2021)The growing prevalence of visual disinformation has become an important problem to solve nowadays. Cheapfake is a new term used for the altered media generated by non-AI techniques. In their recent COSMOS work, the authors ... -
Cost minimization for deploying serverless functions
(ACM, 2021-03)The costs of serverless functions increase proportional to the amount of memory reserved on the deployed server. However, increasing the amount of memory decreases the function execution time, which is also a factor that ... -
Cost-benefit approach to degradation of electrolytic capacitors
(IEEE, 2014)Aluminum electrolytic capacitors are widely used as a filter or bulky capacitor after rectification stages of switching power supplies (SMPS). Fly-back, forward, and resonant converter topologies, which are widely used in ... -
Could head motions affect quality when viewing 360° videos?
(IEEE, 2023-04-01)Measuring quality accurately and quickly (preferably in real time) when streaming 360° videos is essential to enhance the user experience. Most quality-of-experience metrics have primarily used viewport quality as a simple ... -
CPU design simplified
(IEEE, 2018-12-10)The first goal of this paper is to introduce a simple and customizable soft CPU named VerySimpleCPU (VSCPU), which could be easily implemented on FPGAs with a complete toolchain including instruction set simulator, assembler, ... -
Creating domain dependent Turkish WordNet and SentiNet
(Global WordNet Association, 2021)A WordNet is a thesaurus that has a structured list of words organized depending on their meanings. WordNet represents word senses, all meanings a single lemma may have, the relations between these senses, and their ... -
Cross-lingual speaker adaptation for statistical speech synthesis using limited data
(Interspeech, 2016)Cross-lingual speaker adaptation with limited adaptation data has many applications such as use in speech-to-speech translation systems. Here, we focus on cross-lingual adaptation for statistical speech synthesis (SSS) ... -
CWT-DPA: Component-wise waiting time for BC-enabled data plane authentication
(Elsevier, 2022-11-24)Software-Defined Networking (SDN) is a promising networking paradigm that brings central management and network programmability to improve existing networking systems. However, SDN has several security threats due to its ...
Share this page