Search
Now showing items 201-210 of 276
Routing-aware partitioning of the internet address space for server ranking in CDNs
(Elsevier, 2017-07)
The goal of Content Delivery Networks (CDNs) is to serve content to end-users with high performance. In order to do that, a CDN measures the latency on the paths from its servers to users and then selects a best available ...
Automated refinement of models for model-based testing using exploratory testing
(Springer International Publishing, 2017-09)
Model-based testing relies on models of the system under test to automatically generate test cases. Consequently, the effectiveness of the generated test cases depends on models. In general, these models are created manually, ...
Efficient combinational circuits for division by small integer constants
(IEEE, 2016)
Division of an integer by an integer constant is a widely used operation and hence justifies a customized efficient implementation. There are various versions of this operation. This paper attacks a particular version of ...
Sequential decision making based on emergent emotion for a humanoid robot
(IEEE, 2017)
Certain emotions and moods can be manifestations of complex and costly neural computations that our brain wants to avoid. Instead of reaching an optimal decision based on the facts, we find it often easier and sometimes ...
Hareketten yapı çıkarımı için görsel kullanıcı arayüzü
(IEEE, 2014)
The usage of computer vision applications such as 3D reconstruction, motion tracking and augmented reality gradually increases. The first and the most important stage of these kind of applications is estimating the 3D scene ...
Location attestation and access control for mobile devices using GeoXACML
(Elsevier, 2017-02)
Access control has been applied in various scenarios in the past for negotiating the best policy. Solutions with XACML for access control has been very well explored by research and have resulted in significant contributions ...
Extending static code analysis with application-specific rules by analyzing runtime execution traces
(Springer International Publishing, 2016)
Static analysis tools cannot detect violations of application-specific rules. They can be extended with specialized checkers that implement the verification of these rules. However, such rules are usually not documented ...
Enabling smart environments through scalable policy reasoning and Internet of Things
(Wiley, 2019-04)
In this paper, we discuss how to combine ontology-based policy reasoning mechanisms with in-use Internet of Things applications to customize and automate device behaviors. We discuss how the policy framework can be extended ...
Runtime verification of Iot systems using complex event processing
(IEEE, 2017)
Internet of Things (IoT) is a new computing paradigm that is proliferated by wide adoption of application level protocols such as MQTT and CoAP, each of which defines different styles of sequential interaction of events. ...
A shared control method for online human-in-the-loop robot learning based on Locally Weighted Regression
(IEEE, 2016)
We propose a novel method that arbitrates the control between the human and the robot actors in a teaching-by-demonstration setting to form synergy between the two and facilitate effective skill synthesis on the robot. We ...
Share this page