Browsing Computer Science by Title
Now showing items 373-392 of 549
-
Optimization by runtime specialization for sparse matrix-vector multiplication
(ACM, 2014)Runtime specialization optimizes programs based on partial information available only at run time. It is applicable when some input data is used repeatedly while other input data varies. This technique has the potential ... -
Optimizing complex sequence pattern extraction using caching
(IEEE, 2011)Complex Event Processing (CEP) has become increasingly important for tracking and monitoring complex event anomalies and trends in event streams emitted from business processes such as supply chain management to online ... -
Optimizing decomposition of software architecture for local recovery
(Springer Science+Business Media, 2013-06)The increasing size and complexity of software systems has led to an amplified number of potential failures and as such makes it harder to ensure software reliability. Since it is usually hard to prevent all the failures, ... -
Optimum encoding approaches on video resolution changes: a comparative study
(IEEE, 2018)Video resolution changes in an HTTP adaptive streaming session may negatively affect the viewer's quality of experience. Our goal is, through encoding, to make such resolution changes less noticeable for the viewers. This ... -
ORTPiece: An ORT-based Turkish image captioning network based on transformers and WordPiece
(IEEE, 2023)Recent transformers-based systems are advancing image captioning applications. However, those works have been mainly applied to English-based image captioning problems. In this paper, we introduce a transformers-based ... -
OzU-NLP at TREC NEWS 2019: Entity ranking
(National Institute of Standards and Technology (NIST), 2019)This paper presents our work and submission for TREC 2019 News Track: Entity Ranking Task. Our approach utilizes Doc2Vec's ability to represent documents as fixed sized numerical vectors. Applied on news articles and ... -
Öbekleme eniyilemesi ve sağlamlığı için yinelemeli bir yaklaşım
(IEEE, 2012)Clustering is a common technique, in all areas where information is obtained from the collected data. In this work, three well-known clustering algorithms namely, K-means, Spectral and DBSCAN are investigated in terms of ... -
ÖZÜ konuşmacı doğrulama sisteminin çok sınıflı senaryoda NIST 2010 veritabanı ile başarımı
(IEEE, 2011)Performance of the speaker verification systems is typically measured based on their binary decision accuracy. However, in speaker verification applications where close to %100 accuracy is required, such as the systems ... -
Parental scaffolding as a bootstrapping mechanism for learning grasp affordances and imitation skills
(Cambridge University Press, 2015-06)Parental scaffolding is an important mechanism that speeds up infant sensorimotor development. Infants pay stronger attention to the features of the objects highlighted by parents, and their manipulation skills develop ... -
Partial observable update for subjective logic and its application for trust estimation
(Elsevier, 2015)Subjective Logic (SL) is a type of probabilistic logic, which is suitable for reasoning about situations with uncertainty and incomplete knowledge. In recent years, SL has drawn a significant amount of attention from the ... -
Patch-wise contrastive style learning for instagram filter removal
(IEEE, 2022)Image-level corruptions and perturbations degrade the performance of CNNs on different downstream vision tasks. Social media filters are one of the most common resources of various corruptions and perturbations for real-world ... -
Pedestrian tracking in outdoor spaces of a suburban university campus for the investigation of occupancy patterns
(Elsevier, 2019-02)The design of a livable and comfortable environment has been one of the main aims of sustainable university campus design. The creation of outdoor spaces for accommodating amenities has a positive effect on users with ... -
Performance analysis of ACTE: A bandwidth prediction method for low-latency chunked streaming
(Association for Computing Machinery, Inc, 2020-07)HTTP adaptive streaming with chunked transfer encoding can offer low-latency streaming without sacrificing the coding efficiency. This allows media segments to be delivered while still being packaged. However, conventional ... -
Performance analysis of meta-learning based bayesian deep kernel transfer methods for regression tasks
(IEEE, 2023)Meta-learning aims to apply existing models on new tasks where the goal is 'learning to learn' so that learning from a limited amount of labeled data or learning in a short amount of time is possible. Deep Kernel Transfer ... -
Performance evaluation of unfolded sparse matrix-vector multiplication
(2015-01)Sparse matrix-vector multiplication (spMV) is a kernel operation in scientific com- putation. There exist problems where a matrix is repeatedly multiplied by many different vectors. For such problems, specializing the spMV ... -
Performance of the OZU speaker verification systems with the NIST SRE 2010 data in a multi-class scenario
(IEEE, 2012)Konuşmacı doğrulama sistemlerinin başarımı tipik olarak ikili karar mekanizmasına dayanır. Yine de finans şirketlerinin çağrı merkezi gibi 100%’ e yakın kesinlik gerektiren uygulamalarda var olan sistemlerin ikili kararlarına ... -
Persica: A Persian corpus for multi-purpose text mining and natural language processing
(IEEE, 2012)Lack of multi-application text corpus despite of the surging text data is a serious bottleneck in the text mining and natural language processing especially in Persian language. This paper presents a new corpus for NEWS ... -
PL/SQL programları i̇çin veri tabanı bağımlılık analizi
(CEUR-WS, 2017)PL/SQL dili ile yazılan programlar, veri tabanı üzerinde prosedür ve fonksiyon objeleri, ve bu objelerin bir kümesini barındıran paket objeleri olarak geliştirilmektedirler. Bu objeler yoğun olarak tablo ve görünüm gibi ... -
Point of sale Fraud detection methods via machine learning
(IEEE, 2023)Restaurant cash registers frequently experience fraudulent transactions, leading to substantial financial losses for operators. Despite several methods aimed at preventing fraud at the cash register, addressing this issue ... -
Policy conflict resolution in IoT via planning
(Advances in Artificial Intelligence, 2017)With the explosion of connected devices to automate tasks, manually governing interactions among such devices—and associated services—has become an impossible task. This is because devices have their own obligations and ...
Share this page