Computer and information sciences topic list of research papers
-
Improved Reliable Trust-Based and Energy-Efficient Data Aggregation for Wireless Sensor Networks2013 / Chen-xu Liu, Yun Liu, Zhen-jiang Zhang
-
Activity Graph Feature Selection for Activity Pattern Classification2014 / Kisung Park, Yongkoo Han, Young-Koo Lee
-
Cryptography over the elliptic curve Ea,b(A3)
Abstract In this work, we are going to study the elliptic curves over the ring A ...
2015 / Abdelhamid Tadmori, Abdelhakim Chillali, M’hammed Ziane -
Connectivity-Aware and Minimum Energy Dissipation Protocol in Wireless Sensor Networks2013 / Dahlila Putri Dahnil, Yaswant Prasad Singh, Chin Kuan Ho
-
Data Mining Techniques for Wireless Sensor Networks: A Survey2013 / Azhar Mahmood, Ke Shi, Shaheen Khatoon, Mi Xiao
-
A Distributed Weighted Possibilistic c-Means Algorithm for Clustering Incomplete Big Sensor Data2014 / Qingchen Zhang, Zhikui Chen
-
Evaluating the Potential of Low Power Systems for Headphone-based Spatial Audio Applications
Abstract Embedded architectures have been traditionally designed tailored to perform a dedicated (specialized) function, and in general feature a limited amount of processing resources as well as exhibit very low power consumption. In this line, the ...
2015 / Jose A. Belloch, Alberto Gonzalez, Rafael Mayo, Antonio M. Vidal, Enrique S. Quintana-Ort́ı -
On the Security of Data Collection and Transmission from Wireless Sensor Networks in the Context of Internet of Things2013 / Hong Yu, Jingsha He, Ruohong Liu, Dajie Ji
-
Feature Selection and Classification of Microarray Data using MapReduce based ANOVA and K-Nearest Neighbor
Abstract The major drawback of microarray data is the ‘curse of dimensionality problem’, this hinders the useful information of dataset and leads to computational instability. Therefore, selecting relevant genes is an imperative in microarray data...
2015 / Mukesh Kumar, Nitish Kumar Rath, Amitav Swain, Santanu Kumar Rath -
Implementing and Improving the Performance of AODV by Receive Reply Method and Securing it from Black Hole Attack
Abstract We attempt to analyze the MANET's routing protocol and improve the security of viz. the Ad hoc On Demand Distance Vector (AODV) routing protocol. We propose modifications to the AODV protocol used in MANET an algorithm to reduce the Black...
2015 / Debarati Roy Choudhury, Leena Ragha, Nilesh Marathe -
Platform-Variant Applications from Platform-Independent Models via Templates
Abstract By raising the level of abstraction from code to models, model-driven development (MDD) emphasises design rather than implementation and platform-specificity. This paper presents an experiment with a MDD approach, which takes...
2011 / Nuno Amálio, Christian Glodt, Frederico Pinto, Pierre Kelsen -
A minimum degree condition forcing complete graph immersion2014 / Matt Devos, Zdeněk Dvořák, Jacob Fox, Jessica McDonald, Bojan Mohar, et al.
-
On coalgebra of real numbers
Abstract We define the continuum up to order isomorphism (and hence homeomorphism) as the final coalgebra of the functor X·ω, ordinal product with ω. This makes an attractive analogy with the definition of the ordinal ω itself as the initial algebra ...
2005 / D. Pavlović, V. Pratt -
Modeling Context Aware Features for Pervasive Computing
Abstract For more than two decades, research in the development of context-aware applications has gained significant attention, in which the context aware should be taken into account to adapt them to the requirements of the environment and users....
2014 / Hamid Mcheick -
A Particle Swarm Approach to Collaborative Filtering based Recommender Systems through Fuzzy Features
Abstract Collaborative filtering (CF) either memory based or model based, has been emerged as an information filtering tool that provides effective recommendations to users utilizing the experiences and opinions of their similar neighbors when they...
2015 / Mohammed Wasid, Vibhor Kant -
Predicting Unit Testing Effort Levels of Classes: An Exploratory Study based on Multinomial Logistic Regression Modeling
Abstract The study aims at investigating empirically the ability of a Quality Assurance Indicator (Qi), a metric that we proposed in a previous work, to predict different levels of unit testing effort of classes in object-oriented systems. To...
2015 / Mourad Badri, Fadel Toure, Luc Lamontagne -
Script format document authentication scheme based on watermarking techniques
Abstract In almost all watermarking-based document authentication systems, the documents are considered as binary images and then, the watermark is embedded using some image watermarking algorithm. However actually important documents are saved...
2015 / M. González-Lee, M. Nakano-Miyatake, H. Pérez-Meana, G. Sánchez-Pérez -
A Novel Nonadditive Collaborative-Filtering Approach Using Multicriteria Ratings2013 / Yi-Chung Hu
-
Adaptive Self-Occlusion Behavior Recognition Based on pLSA2013 / Hong-bin Tu, Li-min Xia, Lun-zheng Tan
-
Image Encryption Scheme Based on Balanced Two-Dimensional Cellular Automata2013 / Xiaoyan Zhang, Chao Wang, Sheng Zhong, Qian Yao