Browsing Computer Science by Title
Now showing items 62-81 of 360
-
DAPNA: an architectural framework for data processing networks
(Springer Science+Business Media, 2013)A data processing network is as a set of (software) components connected through communication channels to apply a series of operations on data. Realization and maintenance of large-scale data processing networks necessitate ... -
Darbe i̇şaretleri̇ i̇çi̇n aşırı-hızlı FPGA tabanlı eǧri̇ beti̇mlenmesi̇
(IEEE, 2012)Bu çalışmada anlatılan donanım 1.5 GHz Analog-Sayısal- Çevirici’den gelen darbe işaret dizisini işleyebilmekte ve darbe işaretlerini genlik, yükselme/düşme süresi ve varış zamanı parametreleriyle özetleyebilmektedir. Söz ... -
Data stream analytics and mining in the cloud
(IEEE, 2012)Due to prevalent use of sensors and network monitoring tools, big volumes of data or “big data” today traverse the enterprise data processing pipelines in a streaming fashion. While some companies prefer to deploy their ... -
Deep reinforcement learning for acceptance strategy in bilateral negotiations
(TÜBİTAK, 2020)This paper introduces an acceptance strategy based on reinforcement learning for automated bilateral negotiation, where negotiating agents bargain on multiple issues in a variety of negotiation scenarios. Several acceptance ... -
Defect-aware nanocrossbar logic mapping through matrix canonization using two-dimensional radix sort
(ACM, 2011-08)Nanocrossbars (i.e., nanowire crossbars) offer extreme logic densities but come with very high defect rates; stuck-open/closed, broken nanowires. Achieving reasonable yield and utilization requires logic mapping that is ... -
Defining architectural viewpoints for quality concerns
(Springer Science+Business Media, 2011)A common practice in software architecture design is to apply architectural views to model the design decisions for the various stakeholder concerns. When dealing with quality concerns, however, it is more difficult to ... -
Democratization of HPC cloud services with automated parallel solvers and application containers
(Wiley, 2018-11-10)In this paper, we investigate several design choices for HPC services at different layers of the cloud computing architecture to simplify and broaden its use cases. We start with the platform-as-a-service (PaaS) layer and ... -
Democratization of runtime verification for internet of things
(Elsevier, 2018-05)Internet of Things (IoT) devices have gained more prevalence in ambient assisted living (AAL) systems. Reliability of AAL systems is critical especially in assuring the safety and well-being of elderly people. Runtime ... -
Description-aware fashion image inpainting with convolutional neural networks in coarse-to-fine manner
(The ACM Digital Library, 2020-04-14)Inpainting a particular missing region in an image is a challenging vision task, and promising improvements on this task have been achieved with the help of the recent developments in vision-related deep learning studies. ... -
Design and implementation of a cloud computing service for finite element analysis
(Elsevier, 2013-06)This paper presents an end-to-end discussion on the technical issues related to the design and implementation of a new cloud computing service for finite element analysis (FEA). The focus is specifically on performance ... -
Design and implementation of a data stream management system with advanced complex event processing capabilities
(2013-06)The world has seen proliferation of data stream applications over the last years. These applications include computer network monitoring, Radio Frequency Identication (RFID)-based supply chain and traffic management systems, ... -
Design for ARINC 653 conformance: architecting independent validation of a safety-critical RTOS
(IEEE, 2014)The ARINC 653 specification not only provides a standard application programming interface for an RTOS, but also specifies how to validate an ARINC 653 based RTOS. ARINC 653 Part 3 Conformity Test Specification specifies ... -
Detection of Alzheimer's disease using prosodic cues in conversational speech
(IEEE, 2014)Automatic diagnosis of the Alzheimer's disease as well as monitoring of the diagnosed patients can make significant economic impact on societies. We investigated an automatic diagnosis approach through the use of speech ... -
Detection of malicious social bots: A survey and a refined taxonomy
(Elsevier, 2020-08-01)Social hots represent a new generation of hots that make use of online social networks (OSNs) as command and control (C&C) channels. Malicious social hots have been used as tools for launching large-scale spam campaigns, ... -
DILAF: A framework for distributed analysis of large-scale system logs for anomaly detection
(Wiley, 2019-02)System logs constitute a rich source of information for detection and prediction of anomalies. However, they can include a huge volume of data, which is usually unstructured or semistructured. We introduce DILAF, a framework ... -
Discovering frequent patterns to bootstrap trust
(Springer International Publishing, 2013)When a new agent enters to an open multiagent system, bootstrapping its trust becomes a challenge because of the lack of any direct or reputational evidence. To get around this problem, existing approaches assume the same ... -
A distributed approach for bitrate selection in HTTP adaptive streaming
(ACM, 2018)Past research has shown that concurrent HTTP adaptive streaming (HAS) players behave selfishly and the resulting competition for shared resources leads to underutilization or oversubscription of the network, presentation ... -
DNN-based speaker-adaptive postfiltering with limited adaptation data for statistical speech synthesis systems
(IEEE, 2019)Deep neural networks (DNNs) have been successfully deployed for acoustic modelling in statistical parametric speech synthesis (SPSS) systems. Moreover, DNN-based postfilters (PF) have also been shown to outperform conventional ... -
Do not predict – Recompute! How value recomputation can truly boost the performance of invisible speculation
(IEEE, 2021-09)Recent architectural approaches that address speculative side-channel attacks aim to prevent software from exposing the microarchitectural state changes of transient execution. The Delay-on-Miss technique is one such ... -
DPSec: A blockchain-based data plane authentication protocol for SDNs
(IEEE, 2020-11-02)Software-Defined Networking (SDN) is a promising networking architecture that enables central management along with network programmability. However, SDN brings additional security threats due to untrusted control and data ...
Share this page