Browsing Computer Science by Title
Now showing items 451-470 of 549
-
A shared control method for online human-in-the-loop robot learning based on Locally Weighted Regression
(IEEE, 2016)We propose a novel method that arbitrates the control between the human and the robot actors in a teaching-by-demonstration setting to form synergy between the two and facilitate effective skill synthesis on the robot. We ... -
Shonan challenge for generative programming: short position paper
(ACM, 2013)The appeal of generative programming is "abstraction without guilt": eliminating the vexing trade-off between writing high-level code and highly-performant code. Generative programming also promises to formally capture the ... -
Shoulder glenohumeral elevation estimation based on upper arm orientation
(IEEE, 2018-10-26)In this paper, the shoulder glenohumeral displacement during the movement of the upper arm is studied. Four modeling approaches were examined and compared to estimate the humeral head elevation (vertical displacement) and ... -
SiameseFuse: A computationally efficient and a not-so-deep network to fuse visible and infrared images
(Elsevier, 2022-09)Recent developments in pattern analysis have motivated many researchers to focus on developing deep learning based solutions in various image processing applications. Fusing multi-modal images has been one such application ... -
Simultaneous human-robot adaptation for effective skill transfer
(IEEE, 2015)In this paper, we propose and implement a human-in-the loop robot skill synthesis framework that involves simultaneous adaptation of the human and the robot. In this framework, the human demonstrator learns to control the ... -
The sixth automated negotiating agents competition (ANAC 2015)
(Springer Nature, 2017)In May 2015, we organized the Sixth International Automated Negotiating Agents Competition (ANAC 2015) in conjunction with AAMAS 2015. ANAC is an international competition that challenges researchers to develop a successful ... -
A small footprint hybrid statistical and unit selection text-to-speech synthesis system for Turkish
(Springer Science+Business Media, 2012)Unit selection based text-to-speech synthesis (TTS) can generate high quality speech. However, The HMM-based text-to-speech (HTS) has also advantages such as the lack of spurious errors that are observed in the unit selection ... -
A small footprint hybrid statistical/unit selection text-to-speech synthesis system for agglutinative languages
(IEEE, 2012)Despite its success, unit selection based text-to-speech synthesis (TTS) has has some disadvantages such as sudden discontinuities in speech that distract the listeners. The HMM-based TTS (HTS) approach has been increasingly ... -
A smart cloud platform service for socialized travel and transportation with mobile support
(2013-09)It is now clear that social networking services are evolving towards mobile web applications and continuous location sharing is also becoming a trend. In this evolution, we believe that the next step will be complete and ... -
Smart job scheduling for high-performance cloud computing services
(Civil-comp, 2011-01)In this paper, we describe the challenges faced and lessons learned while establishing a large-scale high performance cloud computing service that enables online mechanical structural analysis and many other scientific ... -
SOBE: Source behavior estimation for subjective opinions In multiagent systems
(International Foundation for Autonomous Agents and Multiagent Systems (IFAAMAS), 2016)In cooperative or hostile environments, agents communicate their subjective opinions about various phenomenon. However, sources of these opinions may not always be competent and honest but more likely erroneous or even ... -
Software UART: A use case for VSCPU worst-case execution time analyzer
(IEEE, 2019)This paper presents our early results of the development of a Worst-Case Execution Time (WCET) analyzer for VSCPU by implementing a software UART system. Our WCET analyzer takes a C program as input and gives the time taken ... -
Solver agent: Towards emotional and opponent-aware agent for human-robot negotiation
(International Foundation for Autonomous Agents and Multiagent Systems (IFAAMAS), 2021)Negotiation is one of the crucial processes for resolving conflicts between parties. In automated negotiation, agent designers mostly take opponent's offers and the remaining time into account while designing their strategies. ... -
Sorec: Self-organizing and resource efficient clustered blockchain network
(Elsevier, 2023-09)With the emergence of Industry 4.0, the features of the technologies that are utilized in broad range of areas are obliged to change according to the new necessities. Especially, the network requirements have to be adopted ... -
Source behavior discovery for fusion of subjective opinions
(IEEE, 2016)Information is at the center of decision making in many systems and use-cases. In cooperative or hostile environments, agents communicate their subjective opinions about various phenomenon. However, sources of these opinions ... -
A sparse matrix‐vector multiplication method with low preprocessing cost
(Wiley, 2018-11-10)Sparse matrix-vector multiplication (SpMV) is a crucial operation used for solving many engineering and scientific problems. In general, there is no single SpMV method that gives high performance for all sparse matrices. ... -
Spectrum-based fault localization for diagnosing concurrency faults
(Springer Science+Business Media, 2013)Concurrency faults are activated by specific thread interleavings at runtime. Traditional fault localization techniques and static analysis fall short to diagnose these faults efficiently. Existing dynamic fault-localization ... -
Spending "quality"' time with the web video
(IEEE, 2016)For consumers, watching video over the Web is the most popular way to access free and premium content on connected devices. The underlying technology -- HTTP adaptive streaming -- is straightforward; however, due to quality ... -
Spoofing attacks to i-vector based voice verification systems using statistical speech synthesis with additive noise and countermeasure
(IEEE, 2016)Even though improvements in the speaker verification (SV) technology with i-vectors increased their real-life deployment, their vulnerability to spoofing attacks is a major concern. Here, we investigated the effectiveness ... -
Spoofing voice verification systems with statistical speech synthesis using limited adaptation data
(Elsevier, 2017-03)State-of-the-art speaker verification systems are vulnerable to spoofing attacks using speech synthesis. To solve the issue, high-performance synthetic speech detectors (SSDs) for attack methods have been proposed recently. ...
Share this page