We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 1-20 of 10,000 results
  1. On the Use of Deep Learning Models for Automatic Animal Classification of Native Species in the Amazon

    Camera trap image analysis, although critical for habitat and species conservation, is often a manual, time-consuming, and expensive task. Thus,...
    María-José Zurita, Daniel Riofrío, ... Maria Baldeon-Calisto in Applications of Computational Intelligence
    Conference paper 2024
  2. Spatial Shrinkage Prior: A Probabilistic Approach to Model for Categorical Variables with Many Levels

    One of the most commonly used methods to prevent overfitting and select relevant variables in regression models with many predictors is the penalized...
    Conference paper 2024
  3. Efficient Motor Learning Through Action-Perception Cycles in Deep Kinematic Inference

    How does the brain adapt to slow changes in the body’s kinematic chain? And how can it perform complex operations that need tool use? Here, we...
    Matteo Priorelli, Ivilin Peev Stoianov in Active Inference
    Conference paper 2024
  4. Dynamical Perception-Action Loop Formation with Developmental Embodiment for Hierarchical Active Inference

    To adapt an autonomous system to a newly given cognitive goal, we propose a method to dynamically combine multiple perception-action loops. Focusing...
    Kanako Esaki, Tadayuki Matsumura, ... Hiroyuki Mizuno in Active Inference
    Conference paper 2024
  5. Contextual Qualitative Deterministic Models for Self-learning Embodied Agents

    This work presents an approach for embodied agents that have to learn models from the least amount of prior knowledge, solely based on knowing which...
    Jan Lemeire, Nick Wouters, ... Aron Heirman in Active Inference
    Conference paper 2024
  6. Comparative Analysis of Uppaal  SMC, ns-3 and MATLAB/Simulink

    IoT networks connect everyday devices to the internet to communicate with one another and humans. It is more cost-effective to analyse and verify the...
    Muhammad Naeem, Michele Albano, ... Brian Nielsen in Engineering of Computer-Based Systems
    Conference paper 2024
  7. Machine Learning Data Suitability and Performance Testing Using Fault Injection Testing Framework

    Creating resilient machine learning (ML) systems has become necessary to ensure production-ready ML systems that acquire user confidence seamlessly....
    Manal Rahal, Bestoun S. Ahmed, Jörgen Samuelsson in Engineering of Computer-Based Systems
    Conference paper 2024
  8. A Literature Survey of Assertions in Software Testing

    Assertions are one of the most useful automated techniques for checking program’s behaviour and hence have been used for different verification and...
    Masoumeh Taromirad, Per Runeson in Engineering of Computer-Based Systems
    Conference paper 2024
  9. Formalization and Verification of MQTT-SN Communication Using CSP

    The MQTT-SN protocol is a lightweight version of the MQTT protocol and is customized for Wireless Sensor Networks (WSN). It removes the need for the...
    Wei Lin, Sini Chen, Huibiao Zhu in Engineering of Computer-Based Systems
    Conference paper 2024
  10. Learning in Uppaal for Test Case Generation for Cyber-Physical Systems

    We propose a test-case generation method for testing cyber-physical systems by using learning and statistical model checking. We use timed game...
    Conference paper 2024
  11. A Software Package (in progress) that Implements the Hammock-EFL Methodology

    This poster paper presents a software package (in progress) that implements the Hammock-EFL approach for Project Management and Parallel Programming,...
    Moshe Goldstein, Oren Eliezer in Engineering of Computer-Based Systems
    Conference paper 2024
  12. A Federated Learning Algorithms Development Paradigm

    At present many distributed and decentralized frameworks for federated learning algorithms are already available. However, development of such a...
    Miroslav Popovic, Marko Popovic, ... Ilija Basicevic in Engineering of Computer-Based Systems
    Conference paper 2024
  13. The Importance of Knowing the Arrival Order in Combinatorial Bayesian Settings

    We study the measure of order-competitive ratio introduced by Ezra et al. [16] for online algorithms in Bayesian combinatorial settings. In our...
    Tomer Ezra, Tamar Garbuz in Web and Internet Economics
    Conference paper 2024
  14. Nash Stability in Fractional Hedonic Games with Bounded Size Coalitions

    We consider fractional hedonic games, a natural and succinct subclass of hedonic games able to model many real-world settings in which agents have to...
    Gianpiero Monaco, Luca Moscardelli in Web and Internet Economics
    Conference paper 2024
  15. Online Nash Welfare Maximization Without Predictions

    The maximization of Nash welfare, which equals the geometric mean of agents’ utilities, is widely studied because it balances efficiency and fairness...
    Zhiyi Huang, Minming Li, ... Tianze Wei in Web and Internet Economics
    Conference paper 2024
  16. Equilibrium Analysis of Customer Attraction Games

    We introduce a game model called “customer attraction game” to demonstrate the competition among online content providers. In this model, customers...
    **aotie Deng, Ningyuan Li, ... Qi Qi in Web and Internet Economics
    Conference paper 2024
  17. Target-Oriented Regret Minimization for Satisficing Monopolists

    We study a robust monopoly pricing problem where a seller aspires to sell an item to a buyer. We assume that the seller, unaware of the buyer’s...
    Napat Rujeerapaiboon, Yize Wei, Yilin Xue in Web and Internet Economics
    Conference paper 2024
  18. AutomaTutor: An Educational Mobile App for Teaching Automata Theory

    Automata theory is one of the core theories in computer science because it allows scientists and practitioners to understand the complexity of...
    Steven Jordaan, Nils Timm, Linda Marshall in Formal Methods: Foundations and Applications
    Conference paper 2024
  19. Leakage Sources of the ICLooPUF: Analysis of a Side-Channel Protected Oscillator-Based PUF

    In the last years, Physical Unclonable Functions (PUFs) became a popular security primitive, which is nowadays also used in several products. As a...
    Conference paper 2024
  20. EFFLUX-F2: A High Performance Hardware Security Evaluation Board

    Side-channel analysis has become a cornerstone of modern hardware security evaluation for cryptographic accelerators. Recently, these techniques are...
    Arpan Jati, Naina Gupta, ... Somitra Kumar Sanadhya in Constructive Side-Channel Analysis and Secure Design
    Conference paper 2024
Did you find what you were looking for? Share feedback.