Computer and information sciences topic list of research papers
-
Network Assisted Content Protection Architectures for a Connected World2012 / Álvaro Villegas, Pablo Pérez, José María Cubero, Enrique Estalayo, Narciso García
-
Patterns of Success in Systems Engineering of IT-Intensive Government Systems
Abstract The objective of this effort was to discover patterns of success in the systems engineering of information-intensive systems in a government acquisition environment using the method of positive deviance. Two large-scale success patterns...
2012 / George Rebovich, Jr., Joseph K. DeRosa -
Simulation and Implementation of an Attractiveness based On-Demand Routing Algorithm for Wireless Sensor Networks
Abstract A sensor network with an on-demand data centric routing strategy is presented. The routing between the sensor nodes and the data sink(s) (base station/s) is based on attractiveness-metric (Pa) gradients for the data forwarding decisions...
2012 / Martin Brandl, Karlheinz Kellner, Christian Fabian -
Quasi-Cyclic LDPC Codes of Column-Weight Two Using a Search Algorithm2007 / Gabofetswe Malema, Michael Liebelt
-
Intelligent Sleeping Mechanism for wireless sensor networks
Abstract In this paper, a Low-Energy Adaptive Clustering Hierarchy Centralized Sleeping Protocol (LEACH-CS) for wireless sensor networks has been proposed. LEACH-CS extends the lifetime of wireless sensor networks by proposing a mechanism that...
2013 / Anar A. Hady, Sherine M. Abd El-kader, Hussein S. Eissa -
Treegraph-based Instruction Scheduling for Stack-based Virtual Machines
Abstract Given the growing interest in the JVM and Microsoftʼs CLI as programming language implementation targets, code generation techniques for efficient stack-code are required. Compiler infrastructures such as LLVM are attractive for their...
2011 / Jiin Park, Jinhyung Park, Wonjoon Song, Songwook Yoon, Bernd Burgstaller, et al. -
Real time implementation of speaker identification system with frame picking algorithm
Abstract Speaker recognition refers to the task of recognizing persons from their spoken speech. It belongs to the field of biometric person authentication which also includes authentication by fingerprints, face and iris. Implementing the...
2010 / Gourav Sarkar, Goutam Saha -
RETRACTED: Information technology (IT) for knowledge management
This article has been retracted: please see Elsevier Policy on Article Withdrawal (http://www.elsevier.com/locate/withdrawalpolicy). This article has been retracted at the request of the Editors. The article duplicates...
2011 / Majid Vahedi, Farhad Nejad Haji Ali Irani -
Credit risk evaluation by using nearest subspace method
Abstract In this paper, a classification method named nearest subspace method is applied for credit risk evaluation. Virtually credit risk evaluation is a very typical classification problem to identify “good” and “bad” creditors. Currently some...
2010 / Xiaofei Zhou, Wenhan Jiang, Yong Shi -
Definition of artificial neural networks with comparison to other networks
Abstract Definition of Artificial Neural Networks (ANNs) is made by computer scientists, artificial intelligence experts and mathematicians in various dimensions. Many of the definitions explain ANN by referring to graphics instead of giving well...
2011 / Erkam Guresen, Gulgun Kayakutlu -
MIMO precoding and mode adaptation in femtocellular systems2013 / Chenzi Jiang, Leonard J Cimini, Nageen Himayat
-
Intrusion tolerant QoS provision in mobile multihop relay networks2013 / Neila Krichene, Noureddine Boudriga
-
Digital era psychology – studies on cognitive changes
Abstract In recent decades there was an increasing impact of the technological development, felt most strongly in the area of information and communication technology (ICT). ICT have become present in many areas of activity and in increasingly more...
2012 / Cristian Vasile -
Web-Based Applications quality factors: A survey and a proposed conceptual model
Abstract Web-Based Applications (WBA) are fast becoming more widespread, larger, more interactive, and more essential to the international use of computers. The most successful WBA companies are beginning to realize that key critical factors of...
2011 / Doaa Nabil, Abeer Mosad, Hesham A. Hefny -
Semantic Crowds: Reusable Population for Virtual Worlds
Abstract Recent advances in crowd simulation techniques have led to realistic agent and group behavior through elaborate behavioral models, complex motion planning algorithms and impressive physics systems. As many crowd simulation solutions...
2012 / Nick Kraayenbrink, Jassin Kessing, Tim Tutenel, Gerwin de Haan, Fernando Marson, et al. -
A Simply Typed λ-Calculus of Forward Automatic Differentiation
Abstract We present an extension of the simply typed λ-calculus with pushforward operators. This extension is motivated by the desire to incorporate forward automatic differentiation, which is an important technique in numeric computing, into...
2012 / Oleksandr Manzyuk -
A Recommendation-based Matchmaking Scheme for Multiple Mobile Social Networks against Private Data Leakage
Abstract Mobile social networks (MSNs) enable users to discover and interact with existing and potential friends both in the cyberspace and in the real world. Although mobile social network applications bring us much convenience, privacy concerns...
2013 / Yong Wang, Jie Hou, Yuan-wei Tan, Xiao Nie -
Intuitive interaction with multifunctional mobile interfaces
Abstract This paper investigates intuitive interaction in the context of mobile phones. The aim is to identify what creates an intuitive interaction with an interface and therefore analyse how features may be designed to maximise the probability of...
2012 / A. Britton, R. Setchi, A. Marsh -
Fast and accurate algorithm for core point detection in fingerprint images
Abstract The core point is used to align between the fingerprints in the fingerprint authentication systems faster than the conventional techniques. To speed up the processing for the real time applications, it is more convenient to implement the...
2013 / G.A. Bahgat, A.H. Khalil, N.S. Abdel Kader, S. Mashali -
Design of Wireless Electronic Scale Based On MSP430 Microprocessor
Abstract To analyze consumer habits and keep good inventory in vegetables, fruits and biscuit shop, detailed transactions information should be saved. An electronic scale is designed based on MSP430 and wireless communication module PTR2000. The...
2012 / Pinwei Zhu, Chunhua Hu