Computer and information sciences topic list of research papers
-
Monitoring of Riak CS Storage Infrastructure
Abstract Riak CS (Cloud Storage) is open source object storage cloud service used by platforms, like, Eucalyptus and CloudStack. To efficiently manage the services, there is a need to provide increased visibility into storage infrastructure. There...
2015 / Pragya Jain, Anita Goel, S.C. Gupta -
Testing the Vestibular Function Development in Junior Figure Skaters Using the Eye Tracking Technique
Abstract Virtual reality technologies are being widely adopted in the field of sport psychology. One of the advantages of this kind of technology is the possibility to assess sportsmen’ readiness to perform complex movements. The study is aimed at...
2014 / Galina Menshikova, Artem Kovalev, Oxana Klimova, Alexandr Chernorizov, Sergey Leonov -
An Adaptable Decision Making Model for Sustainable Enterprise Interoperability
Abstract The need for modern enterprises to seamlessly interoperate, exchange resources and co-create with other enterprises poses significant challenges on the management of cross-enterprise information flows. This paper aims to introduce new ways...
2014 / Damianos Sakas, Konstadinos Kutsikos -
A Generic Model of Execution for Synthesizing Interpreted Domain-Specific Models
Abstract The prevalent application of domain-specific modeling languages (DSMLs) requires developers to initially specify the require- ments for a software product as a domain-specific model then transform that model to a high-level language for...
2015 / Mark Allison, Peter J. Clarke, Xudong He -
Efficient Reduction of Access Latency through Object Correlations in Virtual Environments2007 / Shao-Shin Hung, Damon Shing-Min Liu
-
Detecting Erase Strokes from Online Handwritten Notes Using Support Vector Classification
Abstract We have implemented a student note-sharing system, AirTransNote, that facilitates collaborative and interactive learning in conven- tional classrooms. With the AirTransNote system, a teacher can immediately share student notes with the...
2015 / Motoki Miura, Yusaku Kobayashi -
Space temporal interference cancellation using TDL array antenna and waveform based OMF for IR-UWB systems
Abstract This paper provides a space temporal interference cancellation method for ultra wide-band (UWB) communication systems based on combination of tapped delay line array antenna and orthogonal matched filter. In order to reduce the interference ...
2015 / Takumi Kobayashi, Masato Suzuki, Chika Sugimoto, Ryuji Kohno -
Multi-Camera Activation Scheme for Target Tracking with Dynamic Active Camera Group and Virtual Grid-Based Target Recovery
Abstract Camera sensor activation schemes are essential for optimizing the usage of resources in wireless visual sensor networks. In this regard, an efficient camera sensor activation scheme which accounts for fast moving targets is proposed. This...
2015 / J. Amudha, P. Arpita -
Color Seal Extraction from Documents: Robustness through Soft Data Fusion2005 / Aureli Soria-Frisch
-
Phrase and Idiom Identification in Assamese
Abstract Identification of phrases and idioms is an indispensable part of computational linguistics work. In case of Assamese, this is a challenging topic mainly because of the cases and affixes used in the language. Though, this language is an...
2016 / Shinjit Kamal Borah, Utpal Sharma -
Logistic Map-Based Fragile Watermarking for Pixel Level Tamper Detection and Resistance2010 / Shan Suthaharan
-
On Bidirectional Transitions between Localist and Distributed Representations: The Case of Common Substrings Search Using Vector Symbolic Architecture
Abstract The contribution of this article is twofold. First, it presents an encoding approach for seamless bidirectional transitions between localist and distributed representation domains. Second, the approach is demonstrated on the example of...
2014 / Denis Kleyko, Evgeny Osipov -
Facilitating forensic examinations of multi-user computer environments through session-to-session analysis of Internet history
Abstract This paper proposes a new approach to the forensic investigation of Internet history artefacts by aggregating the history from a recovered device into sessions and comparing those sessions to other sessions to determine whether they are...
2016 / David W. Gresty, Diane Gan, George Loukas, Constantinos Ierotheou -
A Novel Data Association Algorithm for Unequal Length Fluctuant Sequence
Abstract There are quantities of such sensors as radar, ESM, navigator in aerospace areas and the sequence data is the most ordinary data in sensor domain. How to mine the information of these data has attracted a great interest in data mining. But...
2015 / Xin Guan, Guidong Sun, Xiao Yi, Qiang Guo -
DENCLUE-IM: A New Approach for Big Data Clustering
Abstract Every day, a large volume of data is generated by multiple sources, social networks, mobile devices, etc. This variety of data sources produce an heterogeneous data, which are engendered in high frequency. One of the techniques allowing to...
2016 / Hajar Rehioui, Abdellah Idrissi, Manar Abourezq, Faouzia Zegrari -
Using Service Clustering and Self-Adaptive MOPSO-CD for QoS-Aware Cloud Service Selection
Abstract A promising way to effectively manage the composition of services in a heterogeneous and dynamic environment is to make workflow management able to self-adapt at runtime to react to changes in its environment by autonomously reconfiguring...
2016 / Giandomenico Spezzano -
Multi-layer Defense Against Malware Attacks on Smartphone Wi-Fi Access Channel
Abstract With increase in Smartphone users, uses have also increased such as email, gaming, internet banking etc. which requires it to always remain connected with Wi-Fi, thus making it vulnerable to numerous attacks. The endeavour in this paper is...
2016 / Kavita Sharma, B.B. Gupta -
An Android-based Trojan Spyware to Study the NotificationListener Service Vulnerability
Abstract Security attacks continue to emerge on daily basis due to the fast growth in the number of smart devices and mobile applications. Attacks take different malware forms such as Spyware and Trojan exploiting different operating system...
2016 / Huda Abualola, Hessa Alhawai, Maha Kadadha, Hadi Otrok, Azzam Mourad -
A low complexity based spectrum management algorithm for ‘Near–Far’ problem in VDSL environment
Abstract In digital subscriber line (DSL) system, crosstalk created by electromagnetic interference among twisted pairs degrades the system performance. Very high bit rate DSL (VDSL), utilizes higher bandwidth of copper cable for data transmission....
2015 / Sunil Sharma, O.P. Sahu -
Distributed Virtualization Manager for KVM Based Cluster
Abstract Recent times have witnessed a growing use of Virtualization and Cluster environment in order to optimally handle and use resources. KVM is a hypervisor, which is used to achieve full virtualization. Many of the cluster environments make use ...
2016 / Uchit Gandhi, Mitul Modi, Mitali Raval, Paavan Maniar, Narendra Patel, et al.