Computer and information sciences topic list of research papers
-
Color by Numbers: An Exploration of the Use of Color as Classification Notation2013 / Rachel Ivy Clarke
-
On super edge-magic deficiency of volvox and dumbbell graphs
Abstract Let G = ( V , E ) ...
2016 / Muhammad Imran, Hafiz Usman Afzal, A.Q. Baig -
Face Recognition Across Gender Transformation Using SVM Classifier
Abstract The face recognition of medically altered faces under gender transformation is performed. Medical alteration is the gender transformation performed by undergoing hormone replacement therapy (HRT). Face images that are undergoing HRT based...
2016 / Archana Vijayan, Shyma Kareem, Jubilant J. Kizhakkethottam -
LSB Layer Independent Robust Steganography using Binary Addition
Abstract In the field of security different steganography techniques hides data within the cover media in such a way so that human perception cannot follow it. All of these also try to follow three challenges of steganography i.e. robustness,...
2016 / Biswajita Datta, Upasana Mukherjee, Samir Kumar Bandyopadhyay -
Hardware acceleration of transactional memory on commodity systems2012 / Jared Casper, Tayo Oguntebi, Sungpack Hong, Nathan G. Bronson, Christos Kozyrakis, et al.
-
Inference for binomial probability based on dependent Bernoulli random variables with applications to meta-analysis and group level studies2016 / Ilyas Bakbergenuly, Elena Kulinskaya, Stephan Morgenthaler
-
Developing an Efficient Pattern Discovery Method for CPU Utilizations of Computers2016 / Zhuoer Gu, Ligang He, Cheng Chang, Jianhua Sun, Hao Chen, et al.
-
Evaluating topic representations for exploring document collections2015 / Nikolaos Aletras, Timothy Baldwin, Jey Han Lau, Mark Stevenson
-
Modified Kalman Filter for GPS Position Estimation over the Indian Sub Continent
Abstract Position accuracy is the measure of a system's capability to provide quality estimates, which in turn depends mainly on measurement noise and the type of algorithm employed. Though many positioning algorithms have emerged, due to its...
2016 / Ganesh Laveti, G. Sasibhushana Rao, Bharati Bidikar -
Comparative Analysis of Black Hole Attack in Ad Hoc Network Using AODV and OLSR Protocols
Abstract Security is an essential factor in wireless ad-hoc network to have safety in transmitting data packets between two wireless sensor nodes. The nodes posses a unique characteristics and it leads to consequential challenges to security design. ...
2016 / K.S. Praveen, H.L. Gururaj, B. Ramesh -
Integer-to-Integer Wavelet Transform Based ECG Steganography for Securing Patient Confidential Information
Abstract Today Point-Of-Care system is being intensively used for moderating the medical influx in medical centres, with the patient's information liaised over internet to remote servers, hosted inside the hospital. Risk of Information Security of...
2016 / C.A. Liji, K.P. Indiradevi, K.K. Anish Babu -
Matrix completion under interval uncertainty
Abstract Matrix completion under interval uncertainty can be cast as a matrix completion problem with element-wise box constraints. We present an efficient alternating-direction parallel coordinate-descent method for the problem. We show that the...
2016 / Jakub Mareček, Peter Richtárik, Martin Takáč -
Kidnapping WhatsApp – Rumors during the search and rescue operation of three kidnapped youth
Abstract During terror attacks, information with unknown credibility might circulate and people use rumors to compensate for information gaps. On 06.12.2014, three teenagers were kidnapped from a bus station in the West Bank and found dead after...
2016 / Tomer Simon, Avishay Goldberg, Dmitry Leykin, Bruria Adini -
SentiBench - a benchmark comparison of state-of-the-practice sentiment analysis methods2016 / Filipe N Ribeiro, Matheus Araújo, Pollyanna Gonçalves, Marcos André Gonçalves, Fabrício Benevenuto
-
Deadness and how to disprove liveness in hybrid dynamical systems
Abstract What if we designed a tool to automatically prove the dynamical properties of systems for which analytic proof is difficult or impossible to obtain? Such a tool would represent a significant advance in the understanding of complex dynamical ...
2016 / Eva M. Navarro-López, Rebekah Carter -
Optimising web site designs for people with learning disabilities2013 / Peter Williams, Christian Hennig
-
Understanding chicken walks on n × n grid: Hamiltonian paths, discrete dynamics, and rectifiable paths2014 / Arni S.R. Srinivasa Rao, Fiona Tomley, Damer Blake
-
Using the wayback machine to mine websites in the social sciences: A methodological resource2015 / Sanjay K. Arora, Yin Li, Jan Youtie, Philip Shapira
-
iCOP: Live forensics to reveal previously unknown criminal media on P2P networks
Abstract The increasing levels of criminal media being shared in peer-to-peer (P2P) networks pose a significant challenge to law enforcement agencies. One of the main priorities for P2P investigators is to identify cases where a user is actively...
2016 / Claudia Peersman, Christian Schulze, Awais Rashid, Margaret Brennan, Carl Fischer -
Biometric Authentication Using Fused Multimodal Biometric
Abstract Biometrics are basically based on the expansion of pattern recognition systems. At present, electronic or optical sensors like cameras and scanning devices are used to capture images, recordings or measurements of a person's ‘unique’...
2016 / D. Jagadiswary, D. Saraswady