Browsing Electronic Engineering and Computer Science by Title
Now showing items 308-327 of 3133
-
Beyond Playing to Win: Diversifying Heuristics for GVGAI
(2017-08-22)General Video Game Playing (GVGP) algorithms are usually focused on winning and maximizing score but combining different objectives could turn out to be a solution that has not been deeply investigated yet. This paper ... -
Beyond the rich-club: Properties of networks related to the better connected nodes
(2018-10-29)Many of the structural characteristics of a network depend on the connectivity with and within the hubs. These dependencies can be related to the degree of a node and the number of links that a node shares with nodes of ... -
Beyond the Self: Using Grounded Affordances to Interpret and Describe Others’ Actions
(Institute of Electrical and Electronics Engineers, 2019)We propose a developmental approach that allows a robot to interpret and describe the actions of human agents by reusing previous experience. The robot first learns the association between words and object affordances by ... -
Big Data Driven Customer Insights for SMEs in Redistributed Manufacturing
(Elsevier BV, 2017)Redistributed manufacturing (RdM) refers to manufacturing business models, strategies, systems and technologies that change the economics and organization of manufacturing, particularly related to location and scale. ... -
Bioinspired Ciliary Force Sensor for Robotic Platforms
(2017-01-20)© 2017 IEEE. The detection of small forces is of great interest in any robotic application that involves interaction with the environment (e.g., objects manipulation, physical human-robot interaction, minimally invasive ... -
Biologically-Inspired Motion Encoding for Robust Global Motion Estimation.
(2017-03)The growing use of cameras embedded in autonomous robotic platforms and worn by people is increasing the importance of accurate global motion estimation (GME). However, existing GME methods may degrade considerably under ... -
BioSec: A Biometric Authentication Framework for Secure and Private Communication among Edge Devices in IoT and Industry 4.0
(IEEE, 2020-11-16)With the rapid increase in the usage areas of Internet of Things (IoT) devices, it brings challenges such as security and privacy. One way to ensure these in IoT-based systems is user authentication. Until today, user ... -
Birds of a feather check together: Leveraging homophily for sequential rumour detection
(Elsevier, 2020-09-08)As breaking news unfolds, social media has become the go-to platform to learn about the latest updates from journalists and eyewitnesses on the ground. The fact that anybody can post content in social media during these ... -
Bisimulation as a logical relation
(2022) -
Black Box Few-Shot Adaptation for Vision-Language models
(2023-10-02) -
Blending acoustic and language model predictions for automatic music transcription
(2019-11-04)In this paper, we introduce a method for converting an input probabilistic piano roll (the output of a typical multi-pitch detection model) into a binary piano roll. The task is an important step for many automatic music ...