Browsing Computer Science by Author "2"
Now showing items 21-40 of 82
-
Effort estimation for architectural refactoring to introduce module isolation
Öztürk, F.; Sarılı, E.; Sözer, Hasan; Aktemur, Tankut Barış (Springer, 2014)The decomposition of software architecture into modular units is driven by both functional and quality concerns. Dependability and security are among quality concerns that require a software to be decomposed into separate ... -
Eklemeli̇ di̇ller i̇çi̇n düşük bellekli̇ melez i̇stati̇sti̇ksel/bi̇ri̇m seçmeli̇ MKS si̇stemi̇
Guner, Ekrem; Demiroğlu, Cenk (IEEE, 2012)The HMM-based TTS (HTS) approach has been increasingly getting more attention from the TTS research community. One of the advantage is the lack of spurious errors that are observed in the unit selection scheme. Another ... -
Emergent emotion via neural computational energy conservation on a humanoid robot
Kırtay, Murat; Öztop, Erhan (IEEE, 2013)This paper presents our initial work on how emotion based behaviors may emerge through computational mechanisms. We hold that in addition to basic emotions such as anger and fear that serves bodily well being of the organism, ... -
Enabling smart environments through scalable policy reasoning and Internet of Things
Göynügür, Emre; Şensoy, Murat; de Mel, G. (Wiley, 2019-04)In this paper, we discuss how to combine ontology-based policy reasoning mechanisms with in-use Internet of Things applications to customize and automate device behaviors. We discuss how the policy framework can be extended ... -
FAS: introducing a service for avoiding faults in composite services
Gülcü, K.; Sözer, Hasan; Aktemur, Tankut Barış (Springer Science+Business Media, 2012)In service-oriented architectures, composite services depend on a set of partner services to perform the required tasks. These partner services may become unavailable due to system and/or network faults, leading to an ... -
Femto hücre erişim noktaları için uygulama bazlı takvimleyicilerin önemi
Mungan, Devin; Ferazoğlu, Gülden; Sunay, Mehmet Oğuz (IEEE, 2012)In this paper, it is proposed that in order to guarantee a certain level of Quality of service (QoS) for different applications in a femtocell network, it is necessary to use application-based scheduling in femtocell access ... -
Finding event correlations in federated wireless sensor networks
Arı, İsmail; Çelebi, Ömer Faruk (IEEE, 2011)Event correlation engines help us find events of interest inside raw sensor data streams and help reduce the data volume, simultaneously. This paper discusses some of the challenges faced in finding event correlations over ... -
Finding relevant features for statistical speech synthesis adaptation
Bruneau, P.; Parisot, O.; Mohammadi, Amir; Demiroğlu, Cenk; Ghoniem, M.; Tamisier, T. (European Language Resources Association, 2014-05)Statistical speech synthesis (SSS) models typically lie in a very high-dimensional space. They can be used to allow speech synthesis on digital devices, using only few sentences of input by the user. However, the adaptation ... -
FPGA bitstream protection with PUFs, obfuscation, and multi-boot
Gören, S.; Özkurt, Ö.; Yıldız, Abdullah; Uğurdağ, Hasan Fatih (IEEE, 2011)With the combination of PUFs, obfuscation, and multi-boot, we are able to do the equivalent of partial bitstream encryption on low-cost FPGAs, which is only featured on high-end FPGAs. Low-cost FPGAs do not even have ... -
Generating runtime verification specifications based on static code analysis alerts
Kılıç, Yunus; Sözer, Hasan (ACM, 2017)Runtime verification techniques verify dynamic system behavior with respect to a set of specifications. These specifications are often created manually based on system requirements and constraints. In this paper, we introduce ... -
Hareketten yapı çıkarımı için görsel kullanıcı arayüzü
Hüroğlu, Cengiz; Erdem, Tanju (IEEE, 2014)The usage of computer vision applications such as 3D reconstruction, motion tracking and augmented reality gradually increases. The first and the most important stage of these kind of applications is estimating the 3D scene ... -
HMM bazlı 3 boyutlu insan hareketi tanıma ile insan ve robotun ortak çalışması
Pehlivan, Alp Burak; Öztop, Erhan (IEEE, 2014)We offer a system for a human-robot cooperation with natural communication in order to make using of robots in human-interactive tasks easier and more effective. This system includes a system with 3D motion capture cameras, ... -
Human adaptation to human–robot shared control
Amirshirzad, Negin; Kumru, Asiye; Öztop, Erhan (IEEE, 2019-04)Human-in-the-loop robot control systems naturally provide the means for synergistic human-robot collaboration through control sharing. The expectation in such a system is that the strengths of each partner are combined to ... -
Hybrid job scheduling for improved cluster utilization
Arı, İsmail; Kocak, Uğur (Springer Science+Business Media, 2014)In this paper, we investigate the models and issues as well as performance benefits of hybrid job scheduling over shared physical clusters. Clustering technologies that are currently supported include MPI, Hadoop-MapReduce ... -
Hybrid nearest-neighbor/cluster adaptive training for rapid speaker adaptation in statistical speech synthesis systems
Mohammadi, Amir; Demiroğlu, Cenk (International Speech Communication Association, 2013)Statistical speech synthesis (SSS) approach has become one of the most popular methods in the speech synthesis field. An advantage of the SSS approach is the ability to adapt to a target speaker with a couple of minutes ... -
Hybrid statistical/unit-selection Turkish speech synthesis using suffix units
Demiroğlu, Cenk; Güner, Ekrem (Springer International Publishing, 2016-12)Unit selection based text-to-speech synthesis (TTS) has been the dominant TTS approach of the last decade. Despite its success, unit selection approach has its disadvantages. One of the most significant disadvantages is ... -
Image denoising using deep convolutional autoencoder with feature pyramids
Çetinkaya, Ekrem; Kıraç, Mustafa Furkan (TÜBİTAK, 2020)Image denoising is 1 of the fundamental problems in the image processing field since it is the preliminary step for many computer vision applications. Various approaches have been used for image denoising throughout the ... -
Konuşmacı aradeğerlemeli SMM tabanlı metinden konuşma sentezleme si̇stemi
Orhan, Mustafa Cem; Demiroğlu, Cenk (IEEE, 2011)Hidden Markov Model (HMM) based text-to-speech (TTS) systems offer many advantages compared to the concatenative approach. One of those advantages is the ability to interpolate between different speakers to generate new ... -
LIG at MediaEval 2015 multimodal person discovery in broadcast TV task
Budnik, M.; Safadi, B.; Besacier, L.; Quénot, G.; Khodabakhsh, Ali; Demiroğlu, Cenk (CEUR-WS, 2015)In this working notes paper the contribution of the LIG team (partnership between Univ. Grenoble Alpes and Ozyegin University) to the Multimodal Person Discovery in Broadcast TV task in MediaEval 2015 is presented. The ... -
Location attestation and access control for mobile devices using GeoXACML
Arunkumar, S.; Soyluoglu, Berker; Şensoy, Murat; Srivatsa, M.; Rajarajan, M. (Elsevier, 2017-02)Access control has been applied in various scenarios in the past for negotiating the best policy. Solutions with XACML for access control has been very well explored by research and have resulted in significant contributions ...
Share this page