Search
Now showing items 191-200 of 454
Postprocessing synthetic speech with a complex cepstrum vocoder for spoofing phase-based synthetic speech detectors
(IEEE, 2017-06)
State-of-the-art speaker verification systems are vulnerable to spoofing attacks. To address the issue, high-performance synthetic speech detectors (SSDs) for existing spoofing methods have been proposed. Phase-based SSDs ...
Availability analysis of software architecture decomposition alternatives for local recovery
(2017)
We present an efficient and easy-to-use methodology to predict—at design time—the availability of systems that support local recovery. Our analysis techniques work at the architectural level, where the software designer ...
How to trust a few among many
(Springer International Publishing, 2017)
The presence of numerous and disparate information sources available to support decision-making calls for efficient methods of harnessing their potential. Information sources may be unreliable, and misleading reports can ...
Privacy enforcement through policy extension
(IEEE, 2016)
Successful coalition operations require contributions from the coalition partners which might have hidden goals and desiderata in addition to the shared coalition goals. Therefore, there is an inevitable risk-utility ...
Moving switching functions to continuous domain
(IEEE, 2016)
This paper proposes a method for moving switching functions to continuous domain. The benefits of this approach are twofold. First, the elementary calculus works with the transformed functions. Second, this transformation ...
A big data processing framework for self-healing internet of things applications
(IEEE, 2016)
In this study, we introduce a big data processing framework that provides self-healing capability in the Internet of Things domain. We discuss the high-level architecture of this framework and its prototype implementation. ...
Autotuning runtime specialization for sparse matrix-vector multiplication
(ACM, 2016-04)
Runtime specialization is used for optimizing programs based on partial information available only at runtime. In this paper we apply autotuning on runtime specialization of Sparse Matrix-Vector Multiplication to predict ...
Kombi̇natoryal test tekni̇kleri̇ni̇n karmaşık olay i̇şleme motorlarında uygulanması
(IEEE, 2012)
Testing practice has a critical place during the design, implementation and integration of software, hardware and complex systems composed of these. Cost of failures caused by bugs that could not be detected and fixed early ...
The fifth automated negotiating agents competition (ANAC 2014)
(Springer Science+Business Media, 2016)
In May 2014, we organized the Fifth International Automated Negotiating Agents Competition (ANAC 2014) in conjunction with AAMAS 2014. ANAC is an international competition that challenges researchers to develop a successful ...
Eklemeli̇ di̇ller i̇çi̇n düşük bellekli̇ melez i̇stati̇sti̇ksel/bi̇ri̇m seçmeli̇ MKS si̇stemi̇
(IEEE, 2012)
The HMM-based TTS (HTS) approach has been increasingly getting more attention from the TTS research community. One of the advantage is the lack of spurious errors that are observed in the unit selection scheme. Another ...
Share this page