Computer and information sciences topic list of research papers
-
Assembly Operations Aided by Augmented Reality: An Endeavour toward a Comparative Analysis
Abstract Costly complex assembly operations supported by augmented reality demands endeavors to achieve a comparative and experimental depiction of different circumstances for assays to analyze fluctuating conclusions where the situation with...
2015 / Fernando Suárez-Warden, Eduardo González Mendívil, Ciro A. Rodríguez, Salvador Garcia-Lumbreras -
Interactive granular computing2016 / Andrzej Skowron, Andrzej Jankowski, Soma Dutta
-
Pseudohexadecimal near maximum likelihood detector
Abstract This paper introduces two newly developed near-maximum likelihood detectors, named pseudohexadecimal and modified pseudohexadecimal near-maximum likelihood detectors. These two detectors are tested against a pseudoquaternary near-maximum...
2016 / Muhanned AL-Rawi, Muaayed AL-Rawi -
LETRAS and NÿMEROS: Two Integrated Web-based Tools for Research in Linguistics and Humanities
Abstract This paper presents the new web-based versions of the applications LETRAS and NUMEROS. The former, LETRAS-Web allows the user to perform concordance operations in pre-loaded and new corpora. The latter, NUMEROS-Web, can perform statistical...
2015 / Hiroto Ueda, Antonio Moreno-Sandoval -
Performance analysis of concurrent workflows2015 / Andreas Kempa-Liehr
-
Semantic Identification: Balancing between Complexity and Validity2006 / M. Falelakis, C. Diou, A. Delopoulos
-
Soft Computing Based Power Control for Interference Mitigation in LTE Femtocell Networks
Abstract In heterogeneous networks (HetNet), transmit power control at Femtocell Access Point (FAP) is a major problem in reducing cross-tier interference, where providing better Quality of Service to femtocell users should be taken into account....
2016 / Nirmala Sivaraj, Padmaloshani Palanisamy -
Discrete-Time Second-Order Distributed Consensus Time Synchronization Algorithm for Wireless Sensor Networks2008 / Gang Xiong, Shalinee Kishore
-
A Binary-based MapReduce Analysis for Cloud Logs
Abstract Efficiently managing and analyzing cloud logs is a difficult and expensive task due the growth in size and variety of formats. In this paper, we propose a binary-based approach for frequency mining correlated attacks in log data. This...
2016 / Mouad Lemoudden, Meryem Amar, Bouabid El Ouahidi -
Characterization of Root-Mean-Square Acceleration Errors in Flexible Structures Undergoing Vibration Testing
Abstract A methodology is described to evaluate the Root-Mean-Square (RMS) errors in acceleration response during the vibration testing of flexible structures like missile and rockets. Simulation studies are carried out on a free-free uniform beam...
2016 / D. Ramkrishna, J. Swapna -
What Type of Information and Scheme does the Data Market Need?
Abstract In several papers, we have been stressing the importance of curation in chance discovery. In order to build user-firendly guidance, which we call curation, in using KeyGraph, Hatanaka analyzed participant's bahaviour during data analysis...
2015 / Hiroki Hatanaka, Akinori Abe -
A Robust Color Object Analysis Approach to Efficient Image Retrieval2004 / Ruofei Zhang, Zhongfei (Mark) Zhang
-
Mobile Station Spatio-Temporal Multipath Clustering of an Estimated Wideband MIMO Double-Directional Channel of a Small Urban 4.5 GHz Macrocell2009 / Lawrence Materum, Jun-ichi Takada, Ichirou Ida, Yasuyuki Oishi
-
Evolving Fortran types with inferred units-of-measure
Abstract Dimensional analysis is a well known technique for checking the consistency of equations involving physical quantities, constituting a kind of type system. Various type systems for dimensional analysis, and its refinement to...
2015 / Dominic Orchard, Andrew Rice, Oleg Oshmyan -
End-to-End Secure Protocol Design on Live Messenger Application
Abstract Currently live messenger is oftenly used as a media for communication among staff in the office or among students doing projects and working in groups or teams. The problem is that live messenger runs under a network with limited security...
2015 / Silfani Putri Kartika, Andra Arfiandy Jusran, Syifa Herning Fadillah, Zulfany Erlisa Rasjid, Tatang Gunar Setiadji, et al. -
Matching structure and bargaining outcomes in buyer–seller networks2015 / Arnold Polanski
-
Improving Legibility of Formal Proofs Based on the Close Reference Principle is NP-Hard2015 / Karol Pąk
-
A tamper-proof audit and control system for the doctor in the loop2016 / Peter Kieseberg, Bernd Malle, Peter Frühwirt, Edgar Weippl, Andreas Holzinger
-
On the performance of cognitive full-duplex relaying under spectrum sharing constraints2015 / Samuel B. Mafra, Hirley Alves, Daniel B. Costa, Richard D. Souza, Evelio M. G. Fernandez, et al.
-
Simulator for Testing and Deepening Knowledge
Abstract Practical knowledge gained at university is an important subject for today's engineering major students. The paper proposes a learning by doing method and involves students attending the Electrical Power University. In this paper we...
2015 / Cosmin Petru Agape, Flavius Dan Surianu, Attila Simo, Alin Vernica