Computer and information sciences topic list of research papers
-
Linking Semantic Models to Support CSP ∥ B Consistency Checking
Abstract Consistency checking in the CSP ∥ B approach verifies that an individual controller process, defined using a sequential non-divergent subset of CSP, never calls a B operation outside its precondition. Previously this was done by...
2006 / Neil Evans, Helen Treharne -
Hyperbolic Julia Sets are Poly-Time Computable
Abstract In this paper we prove that hyperbolic Julia sets are locally computable in polynomial time. Namely, for each complex hyperbolic polynomial p ( z ...
2005 / Mark Braverman -
Preface2007 / Marcelo Fiore
-
Simplifying Itai-Rodeh Leader Election for Anonymous Rings
Abstract We present two probabilistic leader election algorithms for anonymous unidirectional rings with FIFO channels, based on an algorithm from Itai and Rodeh [A. Itai and M. Rodeh. Symmetry breaking in distributive networks. In Proc. FOCS'81,...
2005 / Wan Fokkink, Jun Pang -
The Recursion Scheme from the Cofree Recursive Comonad
Abstract We instantiate the general comonad-based construction of recursion schemes for the initial algebra of a functor F to the cofree recursive comonad on F. Differently from the scheme based on the cofree comonad on F in a similar fashion, this...
2011 / Tarmo Uustalu, Varmo Vene -
Exogenous Probabilistic Computation Tree Logic
Abstract We define a logic EpCTL for reasoning about the evolution of probabilistic systems. System states correspond to probability distributions over classical states and the system evolution is modelled by probabilistic Kripke structures that...
2007 / Pedro Baltazar, Paulo Mateus, Rajagopal Nagarajan, Nikolaos Papanikolaou -
Using Assertions to Enhance the Correctness of Kmelia Components and their Assemblies
Abstract The Kmelia component model is an abstract formal component model based on services. It is dedicated to the specification and development of correct components. This work enriches the Kmelia language to allow the description of data,...
2010 / Pascal André, Gilles Ardourel, Christian Attiogbé, Arnaud Lanoix -
A Formal Approach for the Evaluation of Network Security Mechanisms Based on RBAC Policies
Abstract Security policy models allow reasoning about security goals achievements. When security mechanisms are implemented, it is difficult to formally validate the security properties against the security goals especially in a network environment. ...
2005 / R. Laborde, B. Nasser, F. Grasset, F. Barrère, A. Benzekri -
A Programmable Analysis and Transformation Framework for Reverse Engineering
Abstract Reverse Engineering refers to understanding an existing software system, and documenting the understanding in a desired format. Depending upon the purpose, which can be problem diagnosis, impact analysis, functional enhancements, or...
2004 / Ravindra Naik, Arun Bahulkar -
Archiving business operational data heritage
Abstract Operational Database Systems are keeping large amounts of information that are not used in any aspect on current business processes. It‟s inactive data that is maintained only for historic reasons or to ensure data patrimony and process...
2012 / Orlando Belo, Alice Marques -
Analysis of Accessibility Initiatives Applied to the Web
Abstract The objective of this study is to investigate the current accessibility initiatives applied to the Web and identify its main characteristics and trends. The method used was a literature review focused on work in the last twenty years in the ...
2012 / Joselice Ferreira Lima, Gustavo Miranda Caran, Luiz Fernando R. Molinaro, Daniela Favarro Garrossini -
A Smart Watch with Embedded Sensors to Recognize Objects, Grasps and Forearm Gestures
Abstract This article proposes a smart watch for the recognition of gestures with objects. The watch is designed to embed different kinds of sensors enabling several functionalities: the recognition of tagged objects by means of RFID technology; the ...
2012 / Elisa Morganti, Leonardo Angelini, Andrea Adami, Denis Lalanne, Leandro Lorenzelli, et al. -
A Framework for Outlier Detection in Evolving Data Streams by Weighting Attributes in Clustering
Abstract Outlier detectionin streamingdataisavery challenging problem. Thisis becauseofthefactthatdata streams cannotbe scanned multiple times. Alsonew conceptsmaykeepevolving. Irrelevant attributescanbe termedasnoisy attributesandsuch attributes...
2012 / Yogita, Durga Toshniwal -
Design of RSA-CA Based E-Health System for Supporting HIPAA Privacy-Security Regulations
Abstract The privacy and the security regulations are two essential requirements of Health Insurance Portability and Accountability Act (HIPAA), recognized by US congress in 1996 as the US Federal Law followed by global e-health industry, in the...
2012 / Sangram Ray, G.P. Biswas -
Effectiveness of Software Metrics for Object-oriented System
Abstract Measurement is a buzzword applied to each and every field of engineering for the development of hardware or firmware products, and software engineering is nowhere an exception. Measurement in software engineering can be best described in...
2012 / Yeresime Suresh, Jayadeep Pati, Santanu Ku Rath -
The Robust Digital Image Watermarking Scheme with Back Propagation Neural Network in DWT Domain
Abstract This paper presents a blind robust digital image watermarking approach based on back propagation neural network in DWT domain. The cover image is decomposed up to 4-levels using DWT. The bitmap of size 64x64 is selected as a watermark. The...
2012 / Nallagarla Ramamurthy, S. Varadarajan -
On the Performance Gain of Hybrid Decode-Amplify-Forward Cooperative Communications2009 / TrungQ Duong, Hans-Jürgen Zepernick
-
A game theoretic model for re-optimizing a railway timetable2013 / Vito Fragnelli, Simona Sanguineti
-
Graph Transformation with Incremental Updates
Abstract We propose an efficient implementation technique for graph transformation systems based on incremental updates. The essence of the technique is to keep track of all possible matchings of graph transformation rules in database tables, and...
2004 / Gergely Varró, Dániel Varró -
A Fast Algorithm for Julia Sets of Hyperbolic Rational Functions
Abstract Although numerous computer programs have been written to compute sets of points which claim to approximate Julia sets, no reliable high precision pictures of non-trivial Julia sets are currently known. Usually, no error estimates are added...
2005 / Robert Rettinger