Browsing Computer Science by Title
Now showing items 1-20 of 382
-
A 2020 perspective on “A generalized stereotype learning approach and its instantiation in trust modeling”
(Elsevier, 2020-03)Owing to the rapid increase of user data and development of machine learning techniques, user modeling has been explored in depth and exploited by both academia and industry. It has prominent impacts in e-commercerelated ... -
Action and language mechanisms in the brain: data, models and neuroinformatics
(Springer Science+Business Media, 2014-01)We assess the challenges of studying action and language mechanisms in the brain, both singly and in relation to each other to provide a novel perspective on neuroinformatics, integrating the development of databases for ... -
Adaptive domain-specific service monitoring
(Springer Science+Business Media, 2014)We propose an adaptive and domain-specific service monitoring approach to detect partner service errors in a cost-effective manner. Hereby, we not only consider generic errors such as file not found or connection timed ... -
Adaptive inverse kinematics of a 9-DOF surgical robot for effective manipulation
(IEEE, 2019)In a robotic-assisted surgical system, fine and precise movement is essential. However, when the user wishes to cover a wider area during tele-operation, the configuration designed for precise motion may restrict the user ... -
Adjusting content work flow infrastructures for HDR
(IEEE, 2018-11-28)This paper discusses what areas of a content workflow infrastructure are affected by integrating new high dynamic range (HDR) video formats into the system while also still continuing to process the standard dynamic range ... -
ADVISOR: An adjustable framework for test oracle automation of visual output systems
(IEEE, 2020-09)Test oracles differentiate between the correct and incorrect system behavior. Automation of test oracles for visual output systems mainly involves image comparison, where a snapshot of the output is compared with respect ... -
Affordance-based altruistic robotic architecture for human–robot collaboration
(Sage, 2019-08)This article proposes a computational model for altruistic behavior, shows its implementation on a physical robot, and presents the results of human-robot interaction experiments conducted with the implemented system. ... -
Agent-based semantic collaborative search
(Executive Committee, Taiwan Academic Network, Ministry of Education, 2013)Next generation of the Web builds upon technologies such as Semantic Web and Intelligent Software Agents. These technologies aim at knowledge representation that allows both humans and software agents to understand and ... -
Agilely assigning sensing assets to mission tasks in a coalition context
(IEEE, 2013)When managing intelligence, surveillance, and reconnaissance (ISR) operations in a coalition context, assigning available sensing assets to mission tasks can be challenging. The authors' approach to ISR asset assignment ... -
Aktör tabanlı sistemler için test kapsama kriterleri
(CEUR-WS, 2018)Aktör tabanlı sistemler, eşzamanlı çalışan ve birbirleri ile asenkron bir şekilde haberleşen aktör isimli otonom elemanlardan oluşmaktadırlar. Asenkron haberleşme sebebiyle aktörler arasında paylaşılan mesajların sıralaması ... -
Algorithm selection and combining multiple learners for residential energy prediction
(Elsevier, 2019-10)Balancing supply and demand management in energy grids requires knowing energy consumption in advance. Therefore, forecasting residential energy consumption accurately plays a key role for future energy systems. For this ... -
Algorithms for obtaining parsimonious higher order neurons
(Springer International Publishing, 2017)Most neurons in the central nervous system exhibit all-or-none firing behavior. This makes Boolean Functions (BFs) tractable candidates for representing computations performed by neurons, especially at finer time scales, ... -
Alt kesit seviyeleri arasında oy çoğunluğu ile sahne tanıma
(2016)In this paper, scene recognition problem, which is a frequently-studied field of computer vision, is tackled. Proposed algorithm utilizes bag of words (BoW) method along with considering sub-segments in the image during ... -
Alternating offers protocols for multilateral negotiation
(Springer International Publishing, 2017)This paper presents a general framework for multilateral turn-taking protocols and two fully specified protocols namely Stacked Alternating Offers Protocol (SAOP) and Alternating Multiple Offers Protocol (AMOP). In SAOP, ... -
Alto sunuculu, eş görevli ağlarda dosya paylaşımı
(IEEE, 2012)In current Internet, the most significant and the growing promotion rate of the network resources usage is due to the Peer to Peer(P2P) applications. These studies show us that the main traffic type, that Internet Service ... -
ANAC 2018: Repeated multilateral negotiation league
(Springer, 2020)This is an extension from a selected paper from JSAI2019. There are a number of research challenges in the field of Automated Negotiation. The Ninth International Automated Negotiating Agent Competition encourages participants ... -
Analysis of energy harvesting for green cognitive radio networks
(IEEE, 2014)This paper develops a Markov Chain analysis framework for an RF energy harvesting cognitive radio network where the secondary system users are furnished with finite-sized batteries. We consider a network where the only ... -
Analysis of speaker similarity in the statistical speech synthesis systems using a hybrid approach
(IEEE, 2012)Statistical speech synthesis (SSS) approach has become one of the most popular and successful methods in the speech synthesis field. Smooth speech transitions, without the spurious errors that are observed in unit selection ... -
Analysis of speech-based measures for detecting and monitoring Alzheimer’s disease
(Springer Science+Business Media, 2014)Automatic diagnosis of the Alzheimer’s disease as well as monitoring of the diagnosed patients can make significant economic impact on societies. We investigated an automatic diagnosis approach through the use of speech ... -
Anti-spoofing for text-independent speaker verification: An initial database, comparison of countermeasures, and human performance
(IEEE, 2016-04)In this paper, we present a systematic study of the vulnerability of automatic speaker verification to a diverse range of spoofing attacks. We start with a thorough analysis of the spoofing effects of five speech synthesis ...
Share this page