Computer Science: Recent submissions
Now showing items 341-360 of 549
-
SOBE: Source behavior estimation for subjective opinions In multiagent systems
(International Foundation for Autonomous Agents and Multiagent Systems (IFAAMAS), 2016)In cooperative or hostile environments, agents communicate their subjective opinions about various phenomenon. However, sources of these opinions may not always be competent and honest but more likely erroneous or even ... -
Sequential decision making based on emergent emotion for a humanoid robot
(IEEE, 2017)Certain emotions and moods can be manifestations of complex and costly neural computations that our brain wants to avoid. Instead of reaching an optimal decision based on the facts, we find it often easier and sometimes ... -
Routing-aware partitioning of the internet address space for server ranking in CDNs
(Elsevier, 2017-07)The goal of Content Delivery Networks (CDNs) is to serve content to end-users with high performance. In order to do that, a CDN measures the latency on the paths from its servers to users and then selects a best available ... -
Policy conflict resolution in IoT via planning
(Advances in Artificial Intelligence, 2017)With the explosion of connected devices to automate tasks, manually governing interactions among such devices—and associated services—has become an impossible task. This is because devices have their own obligations and ... -
Impact of education and experience level on the effectiveness of exploratory testing: an industrial case study
(IEEE, 2017)Exploratory Testing (ET) is a widely applied approach in practice. This approach relies on the knowledge and experience of test engineers and technicians who perform ET. Hence, we aimed at evaluating the impact of education ... -
Alternating offers protocols for multilateral negotiation
(Springer International Publishing, 2017)This paper presents a general framework for multilateral turn-taking protocols and two fully specified protocols namely Stacked Alternating Offers Protocol (SAOP) and Alternating Multiple Offers Protocol (AMOP). In SAOP, ... -
A complex adaptive system of systems approach to human–automation interaction in smart grid
(Wiley, 2015)This chapter expresses three cognitive genres: descriptive genre, normative/prescriptive genre, and know-how genre. The descriptive genre introduces and discusses on the following disciplines: the core concepts of complexity, ... -
A big data processing framework for self-healing internet of things applications
(IEEE, 2016)In this study, we introduce a big data processing framework that provides self-healing capability in the Internet of Things domain. We discuss the high-level architecture of this framework and its prototype implementation. ... -
Using high-level synthesis for rapid design of video processing pipes
(IEEE, 2016)In this work, we share our experience in using High-Level Synthesis (HLS) for rapid development of an optical flow design on FPGA. We have performed HLS using Vivado HLS as well as a HLS tool we have developed for the ... -
Fast one- and two-pick fixed-priority selection and muxing circuits
(IEEE, 2016)Priority encoders and arbiters usually drive multiplexers (muxes). Latency optimization of priority encoders and multiplexer trees has usually been handled separately in the literature. However, in some applications with ... -
Postprocessing synthetic speech with a complex cepstrum vocoder for spoofing phase-based synthetic speech detectors
(IEEE, 2017-06)State-of-the-art speaker verification systems are vulnerable to spoofing attacks. To address the issue, high-performance synthetic speech detectors (SSDs) for existing spoofing methods have been proposed. Phase-based SSDs ... -
Privacy enforcement through policy extension
(IEEE, 2016)Successful coalition operations require contributions from the coalition partners which might have hidden goals and desiderata in addition to the shared coalition goals. Therefore, there is an inevitable risk-utility ... -
Consumer communications and the next generation broadcast networks
(IEEE, 2016)Over 20 years ago the challenge for the communications community was the convergence between networking, telecommunication, and broadcasting. This challenge has been fairly well met, and we now note that around the world ... -
Using eigenvoices and nearest-neighbors in HMM-based cross-lingual speaker adaptation with limited data
(IEEE, 2017-04)Cross-lingual speaker adaptation for speech synthesis has many applications, such as use in speech-to-speech translation systems. Here, we focus on cross-lingual adaptation for statistical speech synthesis systems using ... -
Synergistic human-robot shared control via human goal estimation
(IEEE, 2016)In this paper, we propose and implement a synergistic human-robot collaboration framework, where the robotic system estimates the intent or goal of the human operator while being controlled by the human in real-time. Having ... -
Spoofing voice verification systems with statistical speech synthesis using limited adaptation data
(Elsevier, 2017-03)State-of-the-art speaker verification systems are vulnerable to spoofing attacks using speech synthesis. To solve the issue, high-performance synthetic speech detectors (SSDs) for attack methods have been proposed recently. ... -
Spoofing attacks to i-vector based voice verification systems using statistical speech synthesis with additive noise and countermeasure
(IEEE, 2016)Even though improvements in the speaker verification (SV) technology with i-vectors increased their real-life deployment, their vulnerability to spoofing attacks is a major concern. Here, we investigated the effectiveness ... -
Spending "quality"' time with the web video
(IEEE, 2016)For consumers, watching video over the Web is the most popular way to access free and premium content on connected devices. The underlying technology -- HTTP adaptive streaming -- is straightforward; however, due to quality ... -
Source behavior discovery for fusion of subjective opinions
(IEEE, 2016)Information is at the center of decision making in many systems and use-cases. In cooperative or hostile environments, agents communicate their subjective opinions about various phenomenon. However, sources of these opinions ... -
Location attestation and access control for mobile devices using GeoXACML
(Elsevier, 2017-02)Access control has been applied in various scenarios in the past for negotiating the best policy. Solutions with XACML for access control has been very well explored by research and have resulted in significant contributions ...
Share this page