Computer Science: Recent submissions
Now showing items 221-240 of 549
-
Image denoising using deep convolutional autoencoder with feature pyramids
(TÜBİTAK, 2020)Image denoising is 1 of the fundamental problems in the image processing field since it is the preliminary step for many computer vision applications. Various approaches have been used for image denoising throughout the ... -
Deep reinforcement learning for acceptance strategy in bilateral negotiations
(TÜBİTAK, 2020)This paper introduces an acceptance strategy based on reinforcement learning for automated bilateral negotiation, where negotiating agents bargain on multiple issues in a variety of negotiation scenarios. Several acceptance ... -
Artificial intelligence tools for academic management: assigning students to academic supervisors
(International Academy of Technology, Education and Development (IATED), 2020)In the last few years, there has been a broad range of research focusing on how learning should take place both in the classroom and outside the classroom. Even though academic dissertations are a vital step in the academic ... -
Taking inventory changes into account while negotiating in supply chain management
(SciTePress, 2020)In a supply chain environment, supply chain entities need to make joint decisions on the transaction of goods under the issues quantity, delivery time and unit price in order to procure/sell goods at right quantities and ... -
A 2020 perspective on “A generalized stereotype learning approach and its instantiation in trust modeling”
(Elsevier, 2020-03)Owing to the rapid increase of user data and development of machine learning techniques, user modeling has been explored in depth and exploited by both academia and industry. It has prominent impacts in e-commercerelated ... -
Game of protocols: Is QUIC ready for prime time streaming?
(Wiley, 2020-05)Quick User Datagram Protocol (UDP) Internet Connections (QUIC) is an experimental and low-latency transport protocol proposed by Google, which is still being improved and specified in the Internet Engineering Task Force ... -
Minimizing false positive rate for DoS attack detection: A hybrid SDN-based approach
(Elsevier, 2020-06)Denial of Service attacks (DoS) are considered to be a major threat against today's communication networks. Recently, a novel networking paradigm that provides enhanced programming abilities has been proposed to attain an ... -
Detection of malicious social bots: A survey and a refined taxonomy
(Elsevier, 2020-08-01)Social hots represent a new generation of hots that make use of online social networks (OSNs) as command and control (C&C) channels. Malicious social hots have been used as tools for launching large-scale spam campaigns, ... -
TruSD: Trust framework for service discovery among IoT devices
(Elsevier, 2020-09-04)IoT provides an environment which enables access to a plethora of different services. In order to reach these services, devices need to decide if the providers are trustable or not. The decision to trust a node with whom ... -
SUTSEC: SDN Utilized trust based secure clustering in IoT
(Elsevier, 2020-09-04)Internet of Things (IoT) technology consists of huge number of heterogeneous devices that create enormous amount of data. Providing a robust communication for billions of devices is one of the most significant challenges ... -
The challenge of negotiation in the game of diplomacy
(Springer Nature, 2019)The game of Diplomacy has been used as a test case for complex automated negotiations for a long time, but to date very few successful negotiation algorithms have been implemented for this game. We have therefore decided ... -
Effect regulated projection of robot’s action space for production and prediction of manipulation primitives through learning progress and predictability based exploration
(IEEE, 2021-06)In this study, we propose an effective action parameter exploration mechanism that enables efficient discovery of robot actions through interacting with objects in a simulated table-top environment. For this, the robot ... -
Sampling-free variational inference of Bayesian neural networks by variance backpropagation
(Association For Uncertainty in Artificial Intelligence (AUAI), 2019)We propose a new Bayesian Neural Net formulation that affords variational inference for which the evidence lower bound is analytically tractable subject to a tight approximation. We achieve this tractability by (i) decomposing ... -
MedSpecSearch: Medical specialty search
(Springer Nature, 2019)MedSpecSearch (www.medspecsearch.com) is a search engine for helping users to find the relevant medical specialty for a doctor visit based on users’ description of symptoms. This system is useful for users who are not sure ... -
ADVISOR: An adjustable framework for test oracle automation of visual output systems
(IEEE, 2020-09)Test oracles differentiate between the correct and incorrect system behavior. Automation of test oracles for visual output systems mainly involves image comparison, where a snapshot of the output is compared with respect ... -
Evaluating the effectiveness of multi-level greedy modularity clustering for software architecture recovery
(Springer Nature, 2019)Software architecture recovery approaches mainly analyze various types of dependencies among software modules to group them and reason about the high-level structural decomposition of a system. These approaches employ a ... -
-
Bandwidth prediction in low-latency chunked streaming
(The ACM Digital Library, 2019-06)HTTP adaptive streaming with chunked transfer encoding can be used to offer low-latency streaming without sacrificing the coding efficiency. While this allows a media segment to be generated and delivered at the same time, ... -
-
Adaptive inverse kinematics of a 9-DOF surgical robot for effective manipulation
(IEEE, 2019)In a robotic-assisted surgical system, fine and precise movement is essential. However, when the user wishes to cover a wider area during tele-operation, the configuration designed for precise motion may restrict the user ...
Share this page