Computer and information sciences topic list of research papers
-
An Efficient Profile Matching Protocol Using Privacy Preserving in Mobile Social Network
Abstract As we know user profile matching with privacy-preservation in mobile social networks (MSNs) and bring in a family of novel profile matching protocols. We first intend an explicit Comparison-based Profile Matching protocol (eCPM), that runs...
2016 / Kundan Shewale, Sachin D. Babar -
Identity and Access Management as Security-as-a-Service from Clouds
Abstract In Security-as-a-service model the focus is on security delivered as cloud services; i.e. security provided through the cloud instead of on premise security solutions. Identity and Access Management (IAM) focuses on authentication,...
2016 / Deepak H. Sharma, C.A. Dhote, Manish M. Potey -
Network coding techniques for VANET advertising applications2015 / Shereen A. M. Ahmed, Sharifah H. S. Ariffin, Norsheila Fisal
-
Transfer AdaBoost SVM for Link Prediction in Newly Signed Social Networks using Explicit and PNR Features
Abstract In signed social network, the user-generated content and interactions have overtaken the web. Questions of whom and what to trust has become increasingly important. We must have methods which predict the signs of links in the social network ...
2015 / Anh-Thu Nguyen-Thi, Phuc Quang Nguyen, Thanh Duc Ngo, Tu-Anh Nguyen-Hoang -
QoE-driven multi-user scheduling and rate adaptation with reduced cross-layer signaling for scalable video streaming over LTE wireless systems2016 / Nabeel Khan, Maria G. Martini
-
Development of new system for detection of bridges construction defects using terrestrial laser remote sensing technology
Abstract There are probable damages and defects happening throughout structure execution or transport and consignment. Defect experience in construction is precious and remarkable. This research work is a trial to develop an easy system to...
2016 / M. Sedek, A. Serwa -
Reflective Text Entry: A Simple Low Effort Predictive Input Method Based on Flexible Abbreviations
Abstract Users with reduced physical functioning such as ALS patients need more time and effort to operate computers. Most of the previous assistive technologies use prefix based predictive text input algorithms. Prefix based predictive text entry...
2015 / Frode Eika Sandnes -
Mining top-k Regular Episodes from Sensor Streams
Abstract The monitoring of human activities plays an important role in health-care applications and for the data mining community. Existing approaches work on activities recognition occurring in sensor data streams. However, regular behaviors have...
2015 / Komate Amphawan, Julie Soulas, Philippe Lenca -
MPD model for radar echo signal of hypersonic targets2014 / Xu Xuefei, Liao Guisheng
-
The Fan–Raspaud conjecture: A randomized algorithmic approach and application to the pair assignment problem in cubic networks2016 / Piotr Formanowicz, Krzysztof Tanaś
-
Modified adaptive input shaping for maneuvering cranes using a feedback MEM gyroscope with null drift2015 / Joaquim Maria Veciana, Salvador Cardona, Pau Català
-
What Makes Redundant Presentation of Multimedia Learning Difficult?
Abstract Research on multimedia learning and on reading comprehension has become ubiquitous over the last decades. Somewhat more specifically, redundancy principle of multimedia learning has been investigated a lot in many different, notably ESL,...
2015 / Adem Soruç -
Assessment Study of Using Online (CSRS) GPS-PPP Service for Mapping Applications in Egypt2011 / Mohamed Abd-Elazeem, Ashraf Farah, Farrag Farrag
-
Experimental analysis of contract net protocol in multi-robot task allocation2013 / Aleksis Liekna, Egons Lavendelis, Arvids Grabovskis
-
Third Party Public Auditing Scheme for Cloud Storage
Abstract Cloud storage is one of the service provided by Cloud computing in which data is maintained, managed, backed up remotely and made available to users over a network (typically the Internet). The user is concerned about the integrity of data...
2016 / Swapnali More, Sangita Chaudhari -
The Application of the Laplace Transform for Modeling of Gas Flow Using Maple¯2014 / Małgorzata Wójcik, Mirosław Szukiewicz, Paweł Kowalik
-
Versatile virtual honeynet management framework2016 / Wenjun Fan, David Fernández, Zhihui Du
-
Analysis of Malicious Behavior of Android Apps
Abstract As increasing in number of Android phones there is simultaneous increase in mobile malware apps which performs malicious activities such as misusing user's private information as sending messages i.e. SMS, reading users contact information...
2016 / Pooja Singh, Pankaj Tiwari, Santosh Singh -
Dynamic Reconstruction of 3D-scenes from Registered Digital Holograms
Abstract The method of reconstruction of digital Fresnel holograms was realized in MATLAB and C++. Digital holograms with sizes varied from 64×64 to 4096×4096 were numerically reconstructed. Dynamic reconstruction of volume scenes with 21 Hz frame...
2015 / L.A. Porshneva, P.A. Cheremkhin, N.N. Evtikhiev, V.V. Krasnov, V.G. Rodin, et al. -
A Novel Approach for Specifying Functional and Non-functional Requirements Using RDS (Requirement Description Schema)
Abstract Requirement Engineering demands a granular level of requirement specifications with key objectives, design constraints and relevant artefacts. There exist some structured approaches, but still these are not complete and do not have open...
2016 / Tejas Shah, SV Patel