Browsing Computer Science by Title
Now showing items 76-95 of 549
-
Challenges and main results of the automated negotiating agents competition (ANAC) 2019
(Springer, 2020)The Automated Negotiating Agents Competition (ANAC) is a yearly-organized international contest in which participants from all over the world develop intelligent negotiating agents for a variety of negotiation problems. ... -
CheckMate: English grammatical error correction for native Turkish speakers
(IEEE, 2023)The covid-19 outbreak left many countries have no choice but turn to online education. Turkish students, who were among those who were affected, faced difficulties in improving their English as the opportunity to have ... -
Coevolution index: A metric for tracking evolutionary coupling
(IEEE, 2023)This paper proposes a new metric, namely the coevolution index (CEI), for measuring the relative evolutionary coupling of modules of a software system. CEI is inspired by the h-index, which is a popular metric used for ... -
Cognition-enabled robot manipulation in human environments: requirements, recent work, and open problems
(IEEE, 2017-09)Service robots are expected to play an important role in our daily lives as our companions in home and work environments in the near future. An important requirement for fulfilling this expectation is to equip robots with ... -
Collective voice of experts in multilateral negotiation
(Springer International Publishing, 2017)Inspired from the ideas such as “algorithm portfolio”, “mixture of experts”, and “genetic algorithm”, this paper presents two novel negotiation strategies, which combine multiple negotiation experts to decide what to bid ... -
Combined AES + AEGIS architectures for high performance and lightweight security applications
(Springer International Publishing, 2014)AES has been the prominent block cipher since its introduction as the standard. It has been the cipher used in almost all new applications that require solid, unbreakable security with reasonable resource usage. Several ... -
Combined weight and density bounds on the polynomial threshold function representation of Boolean functions
(Elsevier, 2022-08)In an earlier report it was shown that an arbitrary n-variable Boolean function f can be represented as a polynomial threshold function (PTF) with 0.75×2n or less number of monomials. In this report, we derive an upper ... -
Combining haar feature and skin color based classifiers for face detection
(IEEE, 2011)This paper presents a hybrid method for face detection in color images. The well known Haar feature-based face detector developed by Viola and Jones (VJ), that has been designed for gray-scale images is combined with a ... -
Combining model-based and risk-based testing for effective test case generation
(IEEE, 2015)Model-based testing employs models of the system under test to automatically generate test cases. In this paper, we propose an iterative approach, in which these models are refined based on the principles of risk-based ... -
Combining semantic web and IoT to reason with health and safety policies
(IEEE, 2018-01-12)Monitoring and following health and safety regulations are especially important - but made difficult - in hazardous work environments such as underground mines to prevent work place accidents and illnesses. Even though ... -
Common media client data (CMCD): Initial findings
(Association for Computing Machinery, Inc, 2021-07-16)In September 2020, the Consumer Technology Association (CTA) published the CTA-5004: Common Media Client Data (CMCD) specification. Using this specification, a media client can convey certain information to the content ... -
Common media server data (CMSD) - update on implementations and validation of key use cases
(ACM, 2023-06-16)The CTA-5006 (Common Media Server Data, CMSD) specification establishes a uniform method for media servers to exchange data with each media object response. The aim is to enhance distribution efficiency, performance, and ... -
Comparative study of credit risk evaluation for unbalanced datasets using deep learning classifiers
(IEEE, 2023)Credit risk assessment deals with calculating the risk of a loan not being repaid. For this reason, a lot of research effort is directed at credit risk analysis. In this study, machine learning models such as Light ... -
A comparison of topologically associating domain callers over mammals at high resolution
(BioMed Central Ltd, 2022-04-12)Background: Topologically associating domains (TADs) are locally highly-interacting genome regions, which also play a critical role in regulating gene expression in the cell. TADs have been first identified while investigating ... -
A complex adaptive system of systems approach to human–automation interaction in smart grid
(Wiley, 2015)This chapter expresses three cognitive genres: descriptive genre, normative/prescriptive genre, and know-how genre. The descriptive genre introduces and discusses on the following disciplines: the core concepts of complexity, ... -
Composing domain-specific physical models with general-purpose software modules in embedded control software
(Springer Science+Business Media, 2014-02)A considerable portion of software systems today are adopted in the embedded control domain. Embedded control software deals with controlling a physical system, and as such models of physical characteristics become part ... -
A computer science-oriented approach to introduce quantum computing to a new audience
(IEEE, 2022-02)Contribution: In this study, an alternative educational approach for introducing quantum computing to a wider audience is highlighted. The proposed methodology considers quantum computing as a generalized probability theory ... -
Conflict resolution in decision making - Second international workshop, COREDEMA 2016, The Hague, The Netherlands, August 29-30, 2016, Revised Selected Papers
(Springer International Publishing, 2017) -
Conflict-based negotiation strategy for human-agent negotiation
(Springer, 2023-12)Day by day, human-agent negotiation becomes more and more vital to reach a socially beneficial agreement when stakeholders need to make a joint decision together. Developing agents who understand not only human preferences ... -
Constrained min-cut replication for k-way hypergraph partitioning
(Informs, 2014)Replication is a widely-used technique in information retrieval and database systems for providing fault tolerance and reducing parallelization and processing costs. Combinatorial models based on hypergraph partitioning ...
Share this page