Search
Now showing items 161-170 of 454
Detection of malicious social bots: A survey and a refined taxonomy
(Elsevier, 2020-08-01)
Social hots represent a new generation of hots that make use of online social networks (OSNs) as command and control (C&C) channels. Malicious social hots have been used as tools for launching large-scale spam campaigns, ...
Alternating offers protocols for multilateral negotiation
(Springer International Publishing, 2017)
This paper presents a general framework for multilateral turn-taking protocols and two fully specified protocols namely Stacked Alternating Offers Protocol (SAOP) and Alternating Multiple Offers Protocol (AMOP). In SAOP, ...
A multi-channel real time implementation of dual tree complex wavelet Transform in field programmable gate arrays
(Springer International Publishing, 2016)
In medical applications, biomedical acquisition systems (BASs) are frequently used in order to diagnose and monitor critical conditions such as stroke, epilepsy, Alzheimer disease, arrhythmias and etc. Biomedical signals ...
A near Pareto optimal approach to student–supervisor allocation with two sided preferences and workload balance
(Elsevier, 2019-03)
The problem of allocating students to supervisors for the development of a personal project or a dissertation is a crucial activity in the higher education environment, as it enables students to get feedback on their work ...
Identifying critical architectural components with spectral analysis of fault trees
(Elsevier, 2016-12)
We increasingly rely on software-intensive embedded systems. Increasing size and complexity of these hardware/software systems makes it necessary to evaluate reliability at the system architecture level. One aspect of this ...
SDNHAS: An SDN-Enabled architecture to optimize qoe in http adaptive streaming
(IEEE, 2017-10)
HTTP adaptive streaming (HAS) is receiving much attention from both industry and academia as it has become the de facto approach to stream media content over the Internet. Recently, we proposed a streaming architecture ...
Design for ARINC 653 conformance: architecting independent validation of a safety-critical RTOS
(IEEE, 2014)
The ARINC 653 specification not only provides a standard application programming interface for an RTOS, but also specifies how to validate an ARINC 653 based RTOS. ARINC 653 Part 3 Conformity Test Specification specifies ...
Preface
(2011)
Automated procedure clustering for reverse engineering PL/SQL programs
(ACM, 2016)
PL/SQL programs are mainly composed of procedures that interact with a database. These procedures are grouped into packages at the architecture design level for increasing modularity and maintainability. However, the ...
Emergent emotion via neural computational energy conservation on a humanoid robot
(IEEE, 2013)
This paper presents our initial work on how emotion based behaviors may emerge through computational mechanisms. We hold that in addition to basic emotions such as anger and fear that serves bodily well being of the organism, ...
Share this page