Computer and information sciences topic list of research papers
-
False and multi-secret steganography in digital images2015 / Marek R. Ogiela, Katarzyna Koptyra
-
TLSkex: Harnessing virtual machine introspection for decrypting TLS communication
Abstract Nowadays, many applications by default use encryption of network traffic to achieve a higher level of privacy and confidentiality. One of the most frequently applied cryptographic protocols is Transport Layer Security (TLS). However, also...
2016 / Benjamin Taubmann, Christoph Frädrich, Dominik Dusold, Hans P. Reiser -
Location-free Minimum Coverage Determination in a Heterogeneous Wireless Sensor Network
Abstract The minimum connected cover problem is one of the most fundamental issues in wireless sensor networks, which directly affects the capability and efficiency of the wireless sensor network (WSN). Constructing a minimum connected coverage has...
2015 / Ahmed M. Khedr -
Visualizing Time-based Weighted Coupling Using Particle Swarm Optimization to Aid Program Comprehension
Abstract By knowing software coupling, developers can get better view of the software quality and improve their productivity in development and maintenance. This paper presents a method to visualize coupling network that are often very complex,...
2015 / Rully Agus Hendrawan, Katsuhisa Maruyama -
A New Straight Line Matching Technique by Integration of Vision-based Image Processing
Abstract In this paper, a new algorithm for a new straight line matching by integration of vision based image processing is being proposed. The corner detector and Hough Line Transform were employed respectively the feature extraction of corners and ...
2016 / Kanuengnit Patoommakesorn, Frédéric Vignat, François Villeneuve -
Co-ordination of Multiple Metamodels, with Application to Healthcare Systems
Abstract Due to their complexity and the plethora of requirements placed upon them, healthcare systems so far have not been adequately modeled for the purpose of software development. As a result, the healthcare software suffers from high...
2014 / Fazle Rabbi, Yngve Lamo, Wendy MacCaull -
Efficient Keyword Search over Encrypted Cloud Data
Abstract With the advent of cloud computing, most of the data owners are outsourcing their complex data management systems from local sites to the commercial public cloud for great flexibility and economic savings. But sensitive data has to be...
2016 / Anuradha Meharwade, G.A. Patil -
Portrait of a Privacy Invasion2015 / Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna
-
A Multi–Agent Brokerage Platform for Media Content Recommendation2015 / Bruno Veloso, Benedita Malheiro, Juan Carlos Burguillo
-
Cloud Services Architectures
Abstract In recent years, types of user devices and applications for cloud services have grown rapidly with little standardization. The users prefer services that are on-demand, scalable, survivable and secure with usage-based billing. In order to...
2015 / Mehmet Toy -
Simulation-games for Learning Conducive Workplaces: A Case Study for Manual Assembly
Abstract All segments of stakeholders in society need to understand economic, environmental and social connections and implications in order to facilitate sustainable development. Currently many people - especially in emerging countries - are not...
2016 / Bastian C. Müller, Carsten Reise, Bui Minh Duc, Günther Seliger -
Detection of Obfuscation in Java Malware
Abstract Code obfuscation was introduced as a viable technique to prevent reverse engineering of software applications. Obfuscation protects an application's key algorithms and data structures from theft by hackers. However, malware authors use the...
2016 / Renuka Kumar, Anand Raj Essar Vaishakh -
Workflow optimization of performance and quality of service for bioinformatics application in high performance computing
Abstract Nowadays, High Performance Computing (HPC) systems commonly used in bioinformatics, such as genome sequencing, incorporate multi-processor architectures. Typically, most bioinformatics applications are multi-threaded and dominated by...
2016 / Rashid Al-Ali, Nagarajan Kathiresan, Mohammed El Anbari, Eric R. Schendel, Tariq Abu Zaid -
Continuous-Space Language Models for Statistical Machine Translation2010 / Holger Schwenk
-
E-ETL: Framework for Managing Evolving ETL Workflows2013 / Artur Wojciechowski
-
Development of a Web Application for Dynamic Production Scheduling in Small and Medium Enterprises2010 / Davorin Kofjač, Andrej Knaflič, Miroljub Kljajić
-
Mining of Association Rules on Large Database Using Distributed and Parallel Computing
Abstract Now days due to rapid growth of data in organizations, extensive data processing is a central point of Information Technology. Mining of Association rules in large database is the challenging task. An Apriori algorithm is widely used to...
2016 / Anil Vasoya, Nitin Koli -
Towards a New Approach for Disambiguation in NLP by Multiple Criterian Decision-Aid2011 / Youssef Hoceini, Mohamed Cheragui, Moncef Abbas
-
A Review on the Various Security Techniques for VANETs
Abstract Vehicular systems (VANETs) are a developing research area with an extensive number of utilization cases. Anticipated applications incorporate safety applications, infotainment services, etc. VANETs connect vehicle into a huge mobile ad hoc...
2016 / Amandeep Singh, Sandeep Kad -
Markov process-based retrieval for encrypted JPEG images2016 / Hang Cheng, Xinpeng Zhang, Jiang Yu, Fengyong Li