Browsing Computer Science by Title
Now showing items 289-308 of 424
-
Parental scaffolding as a bootstrapping mechanism for learning grasp affordances and imitation skills
(Cambridge University Press, 2015-06)Parental scaffolding is an important mechanism that speeds up infant sensorimotor development. Infants pay stronger attention to the features of the objects highlighted by parents, and their manipulation skills develop ... -
Partial observable update for subjective logic and its application for trust estimation
(Elsevier, 2015)Subjective Logic (SL) is a type of probabilistic logic, which is suitable for reasoning about situations with uncertainty and incomplete knowledge. In recent years, SL has drawn a significant amount of attention from the ... -
Pedestrian tracking in outdoor spaces of a suburban university campus for the investigation of occupancy patterns
(Elsevier, 2019-02)The design of a livable and comfortable environment has been one of the main aims of sustainable university campus design. The creation of outdoor spaces for accommodating amenities has a positive effect on users with ... -
Performance analysis of ACTE: A bandwidth prediction method for low-latency chunked streaming
(Association for Computing Machinery, Inc, 2020-07)HTTP adaptive streaming with chunked transfer encoding can offer low-latency streaming without sacrificing the coding efficiency. This allows media segments to be delivered while still being packaged. However, conventional ... -
Performance evaluation of unfolded sparse matrix-vector multiplication
(2015-01)Sparse matrix-vector multiplication (spMV) is a kernel operation in scientific com- putation. There exist problems where a matrix is repeatedly multiplied by many different vectors. For such problems, specializing the spMV ... -
Performance of the OZU speaker verification systems with the NIST SRE 2010 data in a multi-class scenario
(IEEE, 2012)Konuşmacı doğrulama sistemlerinin başarımı tipik olarak ikili karar mekanizmasına dayanır. Yine de finans şirketlerinin çağrı merkezi gibi 100%’ e yakın kesinlik gerektiren uygulamalarda var olan sistemlerin ikili kararlarına ... -
Persica: A Persian corpus for multi-purpose text mining and natural language processing
(IEEE, 2012)Lack of multi-application text corpus despite of the surging text data is a serious bottleneck in the text mining and natural language processing especially in Persian language. This paper presents a new corpus for NEWS ... -
PL/SQL programları i̇çin veri tabanı bağımlılık analizi
(CEUR-WS, 2017)PL/SQL dili ile yazılan programlar, veri tabanı üzerinde prosedür ve fonksiyon objeleri, ve bu objelerin bir kümesini barındıran paket objeleri olarak geliştirilmektedirler. Bu objeler yoğun olarak tablo ve görünüm gibi ... -
Policy conflict resolution in IoT via planning
(Advances in Artificial Intelligence, 2017)With the explosion of connected devices to automate tasks, manually governing interactions among such devices—and associated services—has become an impossible task. This is because devices have their own obligations and ... -
Postprocessing synthetic speech with a complex cepstrum vocoder for spoofing phase-based synthetic speech detectors
(IEEE, 2017-06)State-of-the-art speaker verification systems are vulnerable to spoofing attacks. To address the issue, high-performance synthetic speech detectors (SSDs) for existing spoofing methods have been proposed. Phase-based SSDs ... -
Predicting shuttle arrival time in istanbul
(Springer Nature, 2020)Nowadays, transportation companies look for smart solutions in order to improve quality of their services. Accordingly, an intercity bus company in Istanbul aims to improve their shuttle schedules. This paper proposes ... -
Preface
(2011) -
Preface
(Springer International Publishing, 2016)The pervasiveness of open systems raises a range of challenges and opportunities for research and technological development in the area of autonomous agents and multi-agent systems. Open systems comprise loosely coupled ... -
-
-
Prioritization of test cases with varying test costs and fault severities for certification testing
(IEEE, 2020-10)We present an industrial case study on the application of test case prioritization techniques in the context of certification testing in consumer electronics domain. Test execution times and fault severities are subject ... -
Privacy enforcement through policy extension
(IEEE, 2016)Successful coalition operations require contributions from the coalition partners which might have hidden goals and desiderata in addition to the shared coalition goals. Therefore, there is an inevitable risk-utility ... -
Probabilistic logic programming with beta-distributed random variables
(Association for the Advancement of Artificial Intelligence, 2019-07-17)We enable aProbLog-a probabilistic logical programming approach-to reason in presence of uncertain probabilities represented as Beta-distributed random variables. We achieve the same performance of state-of-the-art algorithms ... -
Processing nested complex sequence pattern queries over event streams
(ACM, 2010)Complex event processing (CEP) has become increasingly important for tracking and monitoring applications ranging from healthcare, supply chain management to surveillance. These monitoring applications submit complex event ... -
Provenance aware run-time verification of things for self-healing Internet of Things applications
(Wiley, 2019-02-10)We propose a run-time verification mechanism of things for self-healing capability in the Internet of Things domain. We discuss the software architecture of the proposed verification mechanism and its prototype implementations. ...
Share this page