Computer and information sciences topic list of research papers
-
Multicriteria Evaluation of Managerial Competences: An Application of the Dominance Principle and the Rough Set Theory2014 / Ayrton Benedito Gaia Do Couto, Luiz Flavio Autran Monteiro Gomes
-
A systematic process for obtaining the behavior of context-sensitive systems2016 / Jéssyka Vilela, Jaelson Castro, João Pimentel
-
Image recoloring using geodesic distance based color harmonization2015 / Xujie Li, Hanli Zhao, Guizhi Nie, Hui Huang
-
Close communities in social networks: boroughs and 2-clubs2016 / S. Laan, M. Marx, R. J. Mokken
-
XNDDF: Towards a Framework for Flexible Near-Duplicate Document Detection Using Supervised and Unsupervised Learning
Abstract The WWW has witnessed the exponential growth of web documents. People of all walks of life depend on the electronic superhighway, Internet, for retrieving information. Search engines retrieve data. Detecting near duplicate documents and...
2015 / Lavanya Pamulaparty, C.V. Guru Rao, M. Sreenivasa Rao -
A Heuristic for Distance Magic Labeling
Abstract A distance magic labeling of a graph G with magic constant k is a bijection λ from the V(G) into {1, 2,. . ., |V(G)|}, such that ∑u∈N(v) λ(u) = k for every vertex v. Here we present a heuristic algorithm for finding distance magic graphs...
2015 / Fuad Yasin, Rinovia Simanjuntak -
Cycles and transitivity by monochromatic paths in arc-coloured digraphs
Abstract A digraph D is an m -coloured digraph if its arcs are coloured with m colours. If ...
2015 / Enrique Casas-Bautista, Hortensia Galeana-Sánchez, Rocío Rojas-Monroy -
Potted IQ—Pot Three2015 / Richard L Gregory
-
Reliable Delay Constrained Multihop Broadcasting in VANETs2010 / Martin Koubek, Susan Rea, Dirk Pesch
-
Truncated DCT and Decomposed DWT SVD Features for Image Retrieval
Abstract This paper describes the comparative study of Truncated DCT-SVD and DWT-SVD. In this paper we propose two different approaches to compute the feature vector for content based image retrieval (CBIR) system. SVD feature of successively...
2016 / N.S.T. Sai, Ravindra Patil, Shailesh Sangle, Bhushan Nemade -
Grouping the Executables to Detect Malwares with High Accuracy
Abstract The metamorphic malware variants with the same malicious behavior (family), can obfuscate themselves to look different from each other. This variation in structure lead to a huge signature database for traditional signature matching...
2016 / Sanjay K. Sahay, Ashu Sharma -
Personalised Learning Materials Based on Dyslexia Types: Ontological Approach
Abstract In recent years, e-learning systems have played an increasingly important role in higher education and, in particular, in enhancing learning experiences for individuals who have learning difficulties. However, it appears that many of the...
2015 / Aisha Yaquob Alsobhi, Nawaz Khan, Harjinder Rahanu -
A Smart Adaptable Architecture Based on Contexts for Cyber Physical Systems
Abstract The key challenge today isn’t in manufacturing circuits but in programming the massively distributed system that will result from putting all the units together to manage daily huge amount of data with dimensionality factors depending on...
2015 / Francesco Rago -
Data-driven Linear Decision Rule Approach for Distributionally Robust Optimization of On-line Signal Control
Abstract We propose a two-stage, on-line signal control strategy for dynamic networks using a linear decision rule (LDR) approach and a distributionally robust optimization (DRO) technique. The first (off-line) stage formulates a LDR that maps...
2015 / Hongcheng Liu, Ke Han, Vikash Gayah, Terry Friesz, Tao Yao -
An intutionistic fuzzy optimization approach to vendor selection problem
Summary Selecting the right vendor is an important business decision made by any organization. The decision involves multiple criteria and if the objectives vary in preference and scope, then nature of decision becomes multiobjective. In this paper, ...
2016 / Prabjot Kaur, K.N.L. Rachana -
Medoid-based clustering using ant colony optimization2016 / Héctor D. Menéndez, Fernando E. B. Otero, David Camacho
-
Communication Support System for Enabling Group Management of Community Units
Abstract In this paper, we propose a system that enables smooth communication by online management of interpersonal relations in commu- nity units such as those based on hobbies, clubs, and university classes. Communication without various...
2015 / Kento Otsuka, Junko Itou, Jun Munemori -
Contention- and Interference-Aware Flow-Based Routing in Wireless Mesh Networks: Design and Evaluation of a Novel Routing Metric2011 / Miguel Catalan-Cid, JoseLuis Ferrer, Carles Gomez, Josep Paradells
-
German Noun Compounds at Seminar Lessons
Abstract The article explores some ways of teaching economy and finance students on a higher course. It looks into the problem of German vocabulary. It presents some considerations concerning compounds. All the complexities of that area are the...
2015 / Sarka Hubackova -
Comparative Analysis of Authenticated Key Agreement Protocols Based on Elliptic Curve Cryptography
Abstract Authenticated key agreement protocol must put in a nutshell of competent and strong cryptographic algorithm which is ensure confidentiality and integrity of message. Key Agreement Protocol using Elliptic Curve Cryptography provide...
2016 / Sonali Nimbhorkar, Latesh Malik