Computer and information sciences topic list of research papers
-
Improving Security in Multi Authority Attribute Based Encryption with Fast Decryption
Abstract Attribute Based Encryption (ABE) is a type of public encryption in decryptor can only decrypt the ciphertext if its attributes of secret key matches the attributes of ciphertext but functionality comes at higher cost. The main idea of this...
2016 / Nikita Gorasia, R.R. Srikanth, Nishant Doshi, Jay Rupareliya -
Using SVM as Back-End Classifier for Language Identification2008 / Hongbin Suo, Ming Li, Ping Lu, Yonghong Yan
-
Performance Analysis of Bit-Width Reduced Floating-Point Arithmetic Units in FPGAs: A Case Study of Neural Network-Based Face Detector2009 / Y. Lee, Y. Choi, M. Lee, S. Ko
-
OLLAF: A Fine Grained Dynamically Reconfigurable Architecture for OS Support2009 / Samuel Garcia, Bertrand Granado
-
Adaptive Optimal Kernel Smooth-Windowed Wigner-Ville Distribution for Digital Communication Signal2009 / Jo Tan, Ahmad Sha'ameri
-
Meeting Scheduling based on Swarm Intelligence
Abstract The meeting scheduling problem is complicated and time-consuming. In fact, finding the right combination to satisfy all attendees’ availabilities, preferences and privacy seems to be arduous. Besides, some meetings need specific equipment...
2015 / Hajer Salem, Ahlem Ben Hassine -
Preface2015 / Elhadi M. Shakshuki, Ansar-Ul-Haque Yasar
-
Segmentation of Clock Drawings Based on Spatial and Temporal Features
Abstract The Clock Drawing Test (CDT) is an inexpensive and effective measure for early detection of cognitive impairment in the elderly, which is important for timely diagnosis and initiation of appropriate treatment. Currently, medical experts...
2015 / Zainab Harbi, Yulia Hicks, Rossitza Setchi, Antony Bayer -
Basis Path Testing Using SGA & HGA with ExLB Fitness Function
Abstract Software testing is the most significant analytic quality assurance for software products, but it is very expensive and time consuming process. This limitation is overcome by automatic testing to reduce high cost and to increase reliability ...
2015 / Deepak Garg, Pallvi Garg -
Modelling Errors in Automatic Speech Recognition for Dysarthric Speakers2009 / Santiago Caballero Morales, Stephen J Cox
-
Dynamic social cloud management scheme based on transformable Stackelberg game2016 / Sungwook Kim
-
ΠgμR-Locally Closed Sets in Supra Topological Spaces
Abstract The aim of this paper is to introduce and investigate a new decomposition of sets called πgμr-locally closed sets and a new decomposition of continuous maps called πgμr-LC continuous maps. Furthermore, we obtain several properties and...
2015 / C. Janaki, V. Jeyanthi -
Robust Adaptive Modified Newton Algorithm for Generalized Eigendecomposition and Its Application2007 / Jian Yang, Feng Yang, Hong-Sheng Xi, Wei Guo, Yanmin Sheng
-
Code Generation in the Columbia Esterel Compiler2007 / Stephen A. Edwards, Jia Zeng
-
An efficient algorithm for partially matched services in internet of services2016 / Mariwan Ahmed, Lu Liu, James Hardy, Bo Yuan, Nick Antonopoulos
-
Lifelong aspect extraction from big data: knowledge engineering2016 / M. Taimoor Khan, Mehr Durrani, Shehzad Khalid, Furqan Aziz
-
Random numbers for parallel computers: Requirements and methods, with emphasis on GPUs
Abstract We examine the requirements and the available methods and software to provide (or imitate) uniform random numbers in parallel computing environments. In this context, for the great majority of applications, independent streams of random...
2016 / Pierre L’Ecuyer, David Munger, Boris Oreshkin, Richard Simard -
A Real-Time Embedded Kernel for Nonvisual Robotic Sensors2008 / Enzo Mumolo, Massimiliano Nolich, Kristijan Lenac
-
Ant colony optimization with immigrants schemes for the dynamic railway junction rescheduling problem with multiple delays2015 / Jayne Eaton, Shengxiang Yang, Michalis Mavrovouniotis
-
SIGHTED: A Framework for Semantic Integration of Heterogeneous Sensor Data on the Internet of Things
Abstract Sensors are embedded nowadays in a growing number of everyday life objects. Smartphones, wearables, and sensor networks together play an important role in bridging the gap between physical and cyber worlds, a fundamental aspect of the...
2016 / Ahmad M. Nagib, Haitham S. Hamza