Browsing Electronic Engineering and Computer Science by Title
Now showing items 403-422 of 3475
-
A case study for human gestures recognition from poorly annotated data
In this paper we present a case study on drinking gesture recognition from a dataset annotated by Experience Sampling (ES). The dataset contains 8825 "sensor events" and users reported 1808 "drink events" through experience ... -
A case study in AI-assisted board game design
(2023-01-01)We use AI agents to play successive design iterations of an analogue board game to understand the sorts of question a designer asks of a game, and how AI play-testing approaches can help answer these questions and reduce ... -
Cast-Gan: Learning to Remove Colour Cast from Underwater Images
(IEEE, 2020-09-01)Underwater images are degraded by blur and colour cast caused by the attenuation of light in water. To remove the colour cast with neural networks, images of the scene taken under white illumination are needed as reference ... -
Categorical Proof-Theoretic Semantics
(Springer, 03-05-2024)In proof-theoretic semantics, model-theoretic validity is replaced by proof-theoretic validity. Validity of formulae is defined inductively from a base giving the validity of atoms using inductive clauses derived from ... -
Causal Modelling of Lower Consequence Rail Safety Incidents
(CRC Press Inc, 2010-08-25)The Safety Risk Model (SRM) is a key source of information for the GB rail industry. It is a structured representation of the 120 hazardous events that can lead to injury or death during the operation of the railway and ... -
CBF-periDB: A Chinese Bamboo Flute Dataset for Periodic Modulation Analysis
(2019-11-04)We present CBF-periDB, a dataset of Chinese bamboo flute performances for ecologically valid analysis of periodic modulations in context. The dataset contains monophonic recordings of four types of isolated playing techniques ... -
Certification of Confluence Proofs using CeTA
(2014-07-13)CeTA was originally developed as a tool for certifying termination proofs which have to be provided as certificates in the CPF-format. Its soundness is proven as part of IsaFoR, the Isabelle Formalization of Rewriting. By ... -
Certification of nontermination proofs using strategies and nonlooping derivations
(2014-10-14)© 2014 Springer International Publishing Switzerland. The development of sophisticated termination criteria for term rewrite systems has led to powerful and complex tools that produce (non)termination proofs automatically. ... -
Certified rule labeling
(2015-06-01)© Julian Nagele and Harald Zankl. The rule labeling heuristic aims to establish confluence of (left-)linear term rewrite systems via decreasing diagrams. We present a formalization of a confluence criterion based on the ... -
ChainsFormer: A Chain Latency-aware Resource Provisioning Approach for Microservices Cluster
(Springer Nature, 2023-09-21)The trend towards transitioning from monolithic applications to microservices has been widely embraced in modern distributed systems and applications. This shift has resulted in the creation of lightweight, fine-grained, ... -
ChainsFormer: A Chain Latency-aware Resource Provisioning Approach for Microservices Cluster
(2023)The trend towards transitioning from monolithic applications to microservices has been widely embraced in modern distributed systems and applications. This shift has resulted in the creation of lightweight, fine-grained, ... -
A Challenge-Response Assisted Authorisation Scheme for Data Access in Permissioned Blockchains
(MDPI, 2020-09)Permissioned blockchains can be applied for sharing data among permitted users to authorise the data access requests in a permissioned blockchain. A consensus network constructed using pre-selected nodes should verify a ... -
The Challenge: From MPEG Intellectual Property Rights Ontologies to Smart Contracts and Blockchains
(Institute of Electrical and Electronics Engineers, 2020-02-26)The Moving Picture Experts Group (MPEG) is an International Organization for Standardization/International Electrotechnical Commission (ISO/IEC) working group that develops media coding standards. These standards include ... -
Challenges in Decentralized Name Management: The Case of ENS
(2022-10-25)DNS has often been criticized for inherent design flaws, which make the system vulnerable to attack. Further, domain names are not fully controlled by users, meaning that they can easily be taken down by authorities and ... -
Challenges in Empirically Testing Memory Persistency Models
(Association for Computing Machinery (ACM), 2024-04-14)Memory persistency models provide the foundational rules for software engineers to develop applications that take advantage of non-volatile memory (NVM), dictating which (and when) writes to NVM are deemed persistent. ...