Skip to main content

Showing 1–18 of 18 results for author: Horvat, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2411.13672  [pdf, other

    cs.LO

    Computable Approximations of Semicomputable Graphs

    Authors: Vedran Čačić, Matea Čelar, Marko Horvat, Zvonko Iljazović

    Abstract: In this work, we study the computability of topological graphs, which are obtained by gluing arcs and rays together at their endpoints. We prove that every semicomputable graph in a computable metric space can be approximated, with arbitrary precision, by its computable subgraph with computable endpoints.

    Submitted 20 November, 2024; originally announced November 2024.

    Comments: 18 pages, 4 figures

    MSC Class: 03D78; 03D80; 03F60 ACM Class: F.1.1

  2. arXiv:2406.00146  [pdf, other

    cs.SD cs.AI cs.LG eess.AS

    A Survey of Deep Learning Audio Generation Methods

    Authors: Matej Božić, Marko Horvat

    Abstract: This article presents a review of typical techniques used in three distinct aspects of deep learning model development for audio generation. In the first part of the article, we provide an explanation of audio representations, beginning with the fundamental audio waveform. We then progress to the frequency domain, with an emphasis on the attributes of human hearing, and finally introduce a relativ… ▽ More

    Submitted 31 May, 2024; originally announced June 2024.

    Comments: 14 pages, 2 figures

  3. arXiv:2403.10296  [pdf, other

    cs.CR

    Formal Security Analysis of the AMD SEV-SNP Software Interface

    Authors: Petar Paradžik, Ante Derek, Marko Horvat

    Abstract: AMD Secure Encrypted Virtualization technologies enable confidential computing by protecting virtual machines from highly privileged software such as hypervisors. In this work, we develop the first, comprehensive symbolic model of the software interface of the latest SEV iteration called SEV Secure Nested Paging (SEV-SNP). Our model covers remote attestation, key derivation, page swap and live mig… ▽ More

    Submitted 10 January, 2025; v1 submitted 15 March, 2024; originally announced March 2024.

    Comments: This work has been submitted to the IEEE for possible publication

  4. arXiv:2402.04209  [pdf

    cs.LG cs.AI

    Acute kidney injury prediction for non-critical care patients: a retrospective external and internal validation study

    Authors: Esra Adiyeke, Yuanfang Ren, Benjamin Shickel, Matthew M. Ruppert, Ziyuan Guan, Sandra L. Kane-Gill, Raghavan Murugan, Nabihah Amatullah, Britney A. Stottlemyer, Tiffany L. Tran, Dan Ricketts, Christopher M Horvat, Parisa Rashidi, Azra Bihorac, Tezcan Ozrazgat-Baslanti

    Abstract: Background: Acute kidney injury (AKI), the decline of kidney excretory function, occurs in up to 18% of hospitalized admissions. Progression of AKI may lead to irreversible kidney damage. Methods: This retrospective cohort study includes adult patients admitted to a non-intensive care unit at the University of Pittsburgh Medical Center (UPMC) (n = 46,815) and University of Florida Health (UFH) (n… ▽ More

    Submitted 6 February, 2024; originally announced February 2024.

  5. arXiv:1505.07398  [pdf

    cs.HC cs.MM

    Comparing affective responses to standardized pictures and videos: A study report

    Authors: Marko Horvat, Davor Kukolja, Dragutin Ivanec

    Abstract: Multimedia documents such as text, images, sounds or videos elicit emotional responses of different polarity and intensity in exposed human subjects. These stimuli are stored in affective multimedia databases. The problem of emotion processing is an important issue in Human-Computer Interaction and different interdisciplinary studies particularly those related to psychology and neuroscience. Accur… ▽ More

    Submitted 30 June, 2017; v1 submitted 27 May, 2015; originally announced May 2015.

    Comments: 5 pages, 4 figures. In the Proceedings of 38th International Convention on Information and Communication Technology, Electronics and Microelectronics MIPRO 2015 (pp. 1394-1398)

  6. arXiv:1505.07396  [pdf

    cs.HC cs.IR

    Retrieval of multimedia stimuli with semantic and emotional cues: Suggestions from a controlled study

    Authors: Marko Horvat, Davor Kukolja, Dragutin Ivanec

    Abstract: The ability to efficiently search pictures with annotated semantics and emotion is an important problem for Human-Computer Interaction with considerable interdisciplinary significance. Accuracy and speed of the multimedia retrieval process depends on the chosen metadata annotation model. The quality of such multifaceted retrieval is opposed to the potential complexity of data setup procedures and… ▽ More

    Submitted 30 June, 2017; v1 submitted 27 May, 2015; originally announced May 2015.

    Comments: 4 pages, 3 figures, 1 table. In the Proceedings of 38th International Convention on Information and Communication Technology, Electronics and Microelectronics MIPRO 2015 (pp. 1399-1402)

  7. arXiv:1505.07395  [pdf

    cs.HC cs.MM

    GWAT: The Geneva Affective Picture Database WordNet Annotation Tool

    Authors: Marko Horvat, Dujo Duvnjak, Davor Jug

    Abstract: The Geneva Affective Picture Database WordNet Annotation Tool (GWAT) is a user-friendly web application for manual annotation of pictures in Geneva Affective Picture Database (GAPED) with WordNet. The annotation tool has an intuitive interface which can be efficiently used with very little technical training. A single picture may be labeled with many synsets allowing experts to describe semantics… ▽ More

    Submitted 30 June, 2017; v1 submitted 27 May, 2015; originally announced May 2015.

    Comments: 5 pages, 3 figures. In the Proceedings of 38th International Convention on Information and Communication Technology, Electronics and Microelectronics MIPRO 2015 (pp. 1403-1407)

  8. STIMONT: A core ontology for multimedia stimuli description

    Authors: Marko Horvat, Nikola Bogunović, Krešimir Ćosić

    Abstract: Affective multimedia documents such as images, sounds or videos elicit emotional responses in exposed human subjects. These stimuli are stored in affective multimedia databases and successfully used for a wide variety of research in psychology and neuroscience in areas related to attention and emotion processing. Although important all affective multimedia databases have numerous deficiencies whic… ▽ More

    Submitted 10 January, 2014; originally announced January 2014.

    Comments: 27 pages, 13 figures

    Journal ref: Multimedia tools and applications, 11042, July 2013

  9. arXiv:1304.0954  [pdf

    cs.IR cs.HC

    Labeling and Retrieval of Emotionally-Annotated Images using WordNet

    Authors: Marko Horvat, Anton Grbin, Gordan Gledec

    Abstract: Repositories of images with semantic and emotion content descriptions are valuable tools in many areas such as Affective Computing and Human-Computer Interaction, but they are also important in the development of multimodal searchable online databases. Ever growing number of image documents available on the Internet continuously motivates research of better annotation models and more efficient ret… ▽ More

    Submitted 10 January, 2014; v1 submitted 3 April, 2013; originally announced April 2013.

    Comments: 16 pages, 4 figures. arXiv admin note: substantial text overlap with arXiv:1302.2223

    Journal ref: International Journal of Knowledge-Based and Intelligent Engineering Systems, Vol. 17, No. 2, pp. 157-166, 2013

  10. arXiv:1303.4893  [pdf

    cs.MM cs.HC

    Multimedia stimuli databases usage patterns: a survey report

    Authors: Marko Horvat, Siniša Popović, Krešimir Ćosić

    Abstract: Multimedia documents such as images, sounds or videos can be used to elicit emotional responses in exposed human subjects. These stimuli are stored in affective multimedia databases and successfully used for a wide variety of research in affective computing, human-computer interaction and cognitive sciences. Affective multimedia databases are simple repositories of multimedia documents with annota… ▽ More

    Submitted 10 January, 2014; v1 submitted 20 March, 2013; originally announced March 2013.

    Comments: 5 pages, 2 figures

    Journal ref: Proceedings of the 36nd International ICT Convention MIPRO 2013, pp. 993-997, 2013

  11. Assessing Semantic Quality of Web Directory Structure

    Authors: Marko Horvat, Gordan Gledec, Nikola Bogunović

    Abstract: The administration of a Web directory content and associated structure is a labor intensive task performed by human domain experts. Because of that there always exists a realistic risk of the structure becoming unbalanced, uneven and difficult to use to all except for a few users proficient in a particular Web directory. These problems emphasize the importance of generic and objective measures of… ▽ More

    Submitted 9 February, 2013; originally announced February 2013.

    Comments: 12 pages, 6 figures. arXiv admin note: substantial text overlap with arXiv:1302.2222

    Journal ref: Lecture Notes in Computer Science, Lecture Notes in Artificial Intelligence, 1, 5796, pp. 377-388 (2009)

  12. arXiv:1302.2223  [pdf

    cs.IR cs.AI cs.MM

    WNtags: A Web-Based Tool For Image Labeling And Retrieval With Lexical Ontologies

    Authors: Marko Horvat, Anton Grbin, Gordan Gledec

    Abstract: Ever growing number of image documents available on the Internet continuously motivates research in better annotation models and more efficient retrieval methods. Formal knowledge representation of objects and events in pictures, their interaction as well as context complexity becomes no longer an option for a quality image repository, but a necessity. We present an ontology-based online image ann… ▽ More

    Submitted 5 December, 2017; v1 submitted 9 February, 2013; originally announced February 2013.

    Comments: 10 pages, 3 figures, published in 16th International Conference on Knowledge-Based and Intelligent Information & Engineering Systems, 10-12 Sep 2012, San Sebastian, Spain

    Journal ref: Frontiers in artificial intelligence and applications, 243, pp. 585-594 (2012)

  13. arXiv:1302.2222  [pdf

    cs.IR cs.DL

    Ontology-Based Administration of Web Directories

    Authors: Marko Horvat, Gordan Gledec, Nikola Bogunović

    Abstract: Administration of a Web directory and maintenance of its content and the associated structure is a delicate and labor intensive task performed exclusively by human domain experts. Subsequently there is an imminent risk of a directory structures becoming unbalanced, uneven and difficult to use to all except for a few users proficient with the particular Web directory and its domain. These problems… ▽ More

    Submitted 9 February, 2013; originally announced February 2013.

    Comments: 22 pages, 9 figures

    Journal ref: Lecture Notes in Computer Science, Transactions on Computational Collective Intelligence I., 6220, pp. 101-120 (2010)

  14. arXiv:1212.0169  [pdf

    cs.HC cs.MM

    Towards semantic and affective coupling in emotionally annotated databases

    Authors: Marko Horvat, Siniša Popović, Krešimir Ćosić

    Abstract: Emotionally annotated databases are repositories of multimedia documents with annotated affective content that elicit emotional responses in exposed human subjects. They are primarily used in research of human emotions, attention and development of stress-related mental disorders. This can be successfully exploited in larger processes like selection, evaluation and training of personnel for occupa… ▽ More

    Submitted 1 December, 2012; originally announced December 2012.

    Comments: 6 pages, 6 figures

    Journal ref: Proceedings of the 35nd International Convention MIPRO 2012 (2012) 1003-1008

  15. arXiv:0903.0829  [pdf

    cs.AI

    Tagging multimedia stimuli with ontologies

    Authors: Marko Horvat, Sinisa Popovic, Nikola Bogunovic, Kresimir Cosic

    Abstract: Successful management of emotional stimuli is a pivotal issue concerning Affective Computing (AC) and the related research. As a subfield of Artificial Intelligence, AC is concerned not only with the design of computer systems and the accompanying hardware that can recognize, interpret, and process human emotions, but also with the development of systems that can trigger human emotional response… ▽ More

    Submitted 4 March, 2009; originally announced March 2009.

    Comments: 7 pages, 7 figures, 1 table, submitted for publication (MIPRO 2009)

  16. arXiv:0812.0885   

    cs.AI

    Elementary epistemological features of machine intelligence

    Authors: Marko Horvat

    Abstract: Theoretical analysis of machine intelligence (MI) is useful for defining a common platform in both theoretical and applied artificial intelligence (AI). The goal of this paper is to set canonical definitions that can assist pragmatic research in both strong and weak AI. Described epistemological features of machine intelligence include relationship between intelligent behavior, intelligent and u… ▽ More

    Submitted 30 June, 2017; v1 submitted 4 December, 2008; originally announced December 2008.

    Comments: The paper needs to be redesigned

  17. arXiv:cs/0703041  [pdf

    cs.OH

    Comparing Architectures of Mobile Applications

    Authors: Kresimir Fertalj, Marko Horvat

    Abstract: This article describes various advantages and disadvantages of SMS, WAP, J2ME and Windows CE technologies in designing mobile applications. In defining the architecture of any software application it is important to get the best trade-off between platform's possibilities and design requirements. Achieving optimum software design is even more important with mobile applications where all computer… ▽ More

    Submitted 8 March, 2007; originally announced March 2007.

    Comments: 8 pages, 7 figures, 6 tables. Proceedings of the 5th WSEAS International Conference on Automation & Information in Venice, Italy

    Journal ref: WSEAS Trans. on COMMUNICATIONS, Issue 4, Volume 3, October 2004, pp. 946-952

  18. arXiv:cs/0702094  [pdf

    cs.OH

    Authentication via wireless networks

    Authors: Darko Fuduric, Marko Horvat, Mario Zagar

    Abstract: Personal authentication is an important process we encounter almost every day; when we are logging on a computer, entering a company where we work, or a restricted area, when we are using our plastic credit cards to pay for a service or to complete some other financial transaction, etc. In each of these processes of personal authentication some kind of magnetic or optical token is required. But… ▽ More

    Submitted 16 February, 2007; originally announced February 2007.

    Comments: 5 pages, 6 figures, 1 table, MIPRO Conference in Opatija, Croatia, 2006

    Journal ref: MIPRO, 2006