Browsing Computer Science by Title
Now showing items 17-36 of 549
-
AIM 2022 challenge on instagram filter removal: Methods and results
(Springer, 2023)This paper introduces the methods and the results of AIM 2022 challenge on Instagram Filter Removal. Social media filters transform the images by consecutive non-linear operations, and the feature maps of the original ... -
Aktör tabanlı sistemler için test kapsama kriterleri
(CEUR-WS, 2018)Aktör tabanlı sistemler, eşzamanlı çalışan ve birbirleri ile asenkron bir şekilde haberleşen aktör isimli otonom elemanlardan oluşmaktadırlar. Asenkron haberleşme sebebiyle aktörler arasında paylaşılan mesajların sıralaması ... -
Algorithm selection and combining multiple learners for residential energy prediction
(Elsevier, 2019-10)Balancing supply and demand management in energy grids requires knowing energy consumption in advance. Therefore, forecasting residential energy consumption accurately plays a key role for future energy systems. For this ... -
Algorithms for obtaining parsimonious higher order neurons
(Springer International Publishing, 2017)Most neurons in the central nervous system exhibit all-or-none firing behavior. This makes Boolean Functions (BFs) tractable candidates for representing computations performed by neurons, especially at finer time scales, ... -
Alt kesit seviyeleri arasında oy çoğunluğu ile sahne tanıma
(2016)In this paper, scene recognition problem, which is a frequently-studied field of computer vision, is tackled. Proposed algorithm utilizes bag of words (BoW) method along with considering sub-segments in the image during ... -
Alternating offers protocols for multilateral negotiation
(Springer International Publishing, 2017)This paper presents a general framework for multilateral turn-taking protocols and two fully specified protocols namely Stacked Alternating Offers Protocol (SAOP) and Alternating Multiple Offers Protocol (AMOP). In SAOP, ... -
Alto sunuculu, eş görevli ağlarda dosya paylaşımı
(IEEE, 2012)In current Internet, the most significant and the growing promotion rate of the network resources usage is due to the Peer to Peer(P2P) applications. These studies show us that the main traffic type, that Internet Service ... -
ANAC 2017: Repeated multilateral negotiation league
(Springer, 2021)The Automated Negotiating Agents Competition (ANAC) is annually organized competition to facilitate the research on automated negotiation. This paper presents the ANAC 2017 Repeated Multilateral Negotiation League. As human ... -
ANAC 2018: Repeated multilateral negotiation league
(Springer, 2020)This is an extension from a selected paper from JSAI2019. There are a number of research challenges in the field of Automated Negotiation. The Ninth International Automated Negotiating Agent Competition encourages participants ... -
Analysis of energy harvesting for green cognitive radio networks
(IEEE, 2014)This paper develops a Markov Chain analysis framework for an RF energy harvesting cognitive radio network where the secondary system users are furnished with finite-sized batteries. We consider a network where the only ... -
Analysis of speaker similarity in the statistical speech synthesis systems using a hybrid approach
(IEEE, 2012)Statistical speech synthesis (SSS) approach has become one of the most popular and successful methods in the speech synthesis field. Smooth speech transitions, without the spurious errors that are observed in unit selection ... -
Analysis of speech-based measures for detecting and monitoring Alzheimer’s disease
(Springer Science+Business Media, 2014)Automatic diagnosis of the Alzheimer’s disease as well as monitoring of the diagnosed patients can make significant economic impact on societies. We investigated an automatic diagnosis approach through the use of speech ... -
Anti-spoofing for text-independent speaker verification: An initial database, comparison of countermeasures, and human performance
(IEEE, 2016-04)In this paper, we present a systematic study of the vulnerability of automatic speaker verification to a diverse range of spoofing attacks. We start with a thorough analysis of the spoofing effects of five speech synthesis ... -
An approach for detecting inconsistencies between behavioral models of the software architecture and the code
(IEEE, 2012)In practice, inconsistencies between architectural documentation and the code might arise due to improper implementation of the architecture or the separate, uncontrolled evolution of the code. Several approaches have been ... -
Arabic offensive language on twitter: Analysis and experiments
(Association for Computational Linguistics (ACL), 2021)Detecting offensive language on Twitter has many applications ranging from detecting/predicting bullying to measuring polarization. In this paper, we focus on building a large Arabic offensive tweet dataset. We introduce ... -
An architecture viewpoint for modeling dynamically configurable software systems
(Elsevier, 2017-01-01)Current software systems are rarely static and need to be able to change their topology and behavior to the changing context. To support the communication among stakeholders, guide the design decisions, and analyze the ... -
Are the streamingformat wars over?
(IEEE, 2018-11-28)An average US viewer watches some form of video content five hours a day. The majority ofthe viewed content is still broadcast (over the air, cable, IPTV or satellite), however, the share of the streaming content has been ... -
An area efficient real time implementation of dual tree complex wavelet transform in field programmable gate arrays
(IEEE, 2015)Biomedical signals (BSs), which give information about the normal condition and also the inherent irregularities of our body, are expected to have non-stationary character due to the time-varying behavior of physiological ... -
Artificial intelligence enabled software-defined networking: A comprehensive overview
(The Institution of Engineering and Technology, 2019-03)Software-defined networking (SDN) represents a promising networking architecture that combines central management and network programmability. SDN separates the control plane from the data plane and moves the network ... -
Artificial intelligence techniques for conflict resolution
(Springer, 2021-08)Conflict resolution is essential to obtain cooperation in many scenarios such as politics and business, as well as our day to day life. The importance of conflict resolution has driven research in many fields like anthropology, ...
Share this page