Computer Science: Recent submissions
Now showing items 301-320 of 549
-
A sparse matrix‐vector multiplication method with low preprocessing cost
(Wiley, 2018-11-10)Sparse matrix-vector multiplication (SpMV) is a crucial operation used for solving many engineering and scientific problems. In general, there is no single SpMV method that gives high performance for all sparse matrices. ... -
Democratization of HPC cloud services with automated parallel solvers and application containers
(Wiley, 2018-11-10)In this paper, we investigate several design choices for HPC services at different layers of the cloud computing architecture to simplify and broaden its use cases. We start with the platform-as-a-service (PaaS) layer and ... -
Adjusting content work flow infrastructures for HDR
(IEEE, 2018-11-28)This paper discusses what areas of a content workflow infrastructure are affected by integrating new high dynamic range (HDR) video formats into the system while also still continuing to process the standard dynamic range ... -
Game theory based bitrate adaptation for Dash.Js reference player
(IEEE, 2018-11-28)Most existing DASH adaptive bitrate (ABR) schemes are designed to behave in their own self-interest and do not perform consistently in all network environments. In this work, we provide a practical implementation, materials ... -
Are the streamingformat wars over?
(IEEE, 2018-11-28)An average US viewer watches some form of video content five hours a day. The majority ofthe viewed content is still broadcast (over the air, cable, IPTV or satellite), however, the share of the streaming content has been ... -
Subjective bayesian networks and human-in-the-loop situational understanding
(Springer, 2018-03-21)In this paper we present a methodology to exploit human-machine coalitions for situational understanding. Situational understanding refers to the ability to relate relevant information and form logical conclusions, as well ... -
Combining semantic web and IoT to reason with health and safety policies
(IEEE, 2018-01-12)Monitoring and following health and safety regulations are especially important - but made difficult - in hazardous work environments such as underground mines to prevent work place accidents and illnesses. Even though ... -
Democratization of runtime verification for internet of things
(Elsevier, 2018-05)Internet of Things (IoT) devices have gained more prevalence in ambient assisted living (AAL) systems. Reliability of AAL systems is critical especially in assuring the safety and well-being of elderly people. Runtime ... -
Towards an efficient anomaly-based intrusion detection for software-defined networks
(Institution of Engineering and Technology, 2018-08-24)Software-defined networking (SDN) is a new paradigm that allows developing more flexible network applications. A SDN controller, which represents a centralised controlling point, is responsible for running various network ... -
A novel runtime verification solution for LoT systems
(IEEE, 2018)Internet of Things (IoT) systems promise a seamless connected world with machines integrating their services without human intervention. It's highly probable that the entities participating in such autonomous machine to ... -
VISOR: A fast image processing pipeline with scaling and translation invariance for test oracle automation of visual output systems
(The ACM Digital Library, 2018-02)A test oracle automation approach proposed for systems that produce visual output.Root causes of accuracy issues analyzed for test oracles based on image comparison.Image processing techniques employed to improve the ... -
A machine learning approach for mechanism selection in complex negotiations
(Springer Nature, 2018-04)Automated negotiation mechanisms can be helpful in contexts where users want to reach mutually satisfactory agreements about issues of shared interest, especially for complex problems with many interdependent issues. A ... -
Supervising topic models with Gaussian processes
(Elsevier, 2018-05)Topic modeling is a powerful approach for modeling data represented as high-dimensional histograms. While the high dimensionality of such input data is extremely beneficial in unsupervised applications including language ... -
Automated negotiating agents competition (ANAC)
(AAAI press, 2017)The annual International Automated Negotiating Agents Competition (ANAC) is used by the automated negotiation research community to benchmark and evaluate its work and to challenge itself. The benchmark problems and ... -
Collective voice of experts in multilateral negotiation
(Springer International Publishing, 2017)Inspired from the ideas such as “algorithm portfolio”, “mixture of experts”, and “genetic algorithm”, this paper presents two novel negotiation strategies, which combine multiple negotiation experts to decide what to bid ... -
Negotiation for incentive driven privacy-preserving information sharing
(Springer International Publishing, 2017)This paper describes an agent-based, incentive-driven, and privacy-preserving information sharing framework. Main contribution of the paper is to give the data provider agent an active role in the information sharing process ... -
Rethinking frequency opponent modeling in automated negotiation
(Springer International Publishing, 2017)Frequency opponent modeling is one of the most widely used opponent modeling techniques in automated negotiation, due to its simplicity and its good performance. In fact, it outperforms even more complex mechanisms like ... -
Algorithms for obtaining parsimonious higher order neurons
(Springer International Publishing, 2017)Most neurons in the central nervous system exhibit all-or-none firing behavior. This makes Boolean Functions (BFs) tractable candidates for representing computations performed by neurons, especially at finer time scales, ... -
Test kâhini olarak görüntü karşılaştırma algoritmalarının değerlendirilmesi
(CEUR-WS, 2017)Televizyon gibi yoğun yazılım içeren gömülü sistemlerin kara kutu testleri, grafik kullanıcı arayüzleri (GKA) aracılığıyla gerçekleştirilmektedir. Bu testlerin otomasyonu kapsamında bir dizi kullanıcı işlemi dışarıdan ... -
PL/SQL programları i̇çin veri tabanı bağımlılık analizi
(CEUR-WS, 2017)PL/SQL dili ile yazılan programlar, veri tabanı üzerinde prosedür ve fonksiyon objeleri, ve bu objelerin bir kümesini barındıran paket objeleri olarak geliştirilmektedirler. Bu objeler yoğun olarak tablo ve görünüm gibi ...
Share this page