Computer and information sciences topic list of research papers
-
Anticipative Hybrid Extreme Rotation Forest
Abstract This paper introduces an improvement on the recently published Hybrid Extreme Rotation Forest (HERF), consisting in the anticipative determination of the the fraction of each classifier architecture included in the ensemble. We call it...
2016 / Borja Ayerdi, Manuel Graña -
Extending JASAG with data processing techniques for speeding up agricultural simulation applications: A case study with Simugan
Abstract Resource-intensive agricultural simulation applications have increased the need for gridification tools –i.e., software to transform and scale up the applications using Grid infrastructures–. Previous research has proposed JASAG, a generic...
2016 / Mathias Longo, Mauricio Arroqui, Juan Rodriguez, Claudio Machado, Cristian Mateos, et al. -
An Automated Transformation Approach for Requirement Specification
Abstract Use cases are often useful in capturing requirements by defining goal-oriented set of interactions between the system and its environment. Formalization of precise requirement is then important for context-aware verification based on use...
2016 / Amel Benabbou, Safia Nait Bahloul, Philippe Dhaussy -
Privacy Issues in Web Services: An Ontology Based Solution
Abstract Privacy is the right of a person to specify that when, how and to what amount information about him is disclosed to others. Due to the tremendous use and popularity of web services, the likelihood of intentional and unintentional privacy...
2016 / Rekha Bhatia, Manpreet Singh -
Performance Analysis of the Physical and Medium Access Control Layer Parameters with Effect of Varying Transmission Power Using IEEE 802.15.4 Standard for Wireless Body Sensor Networks
Abstract Wireless Body Area Network (WBAN) consists of miniaturized, tiny, low power body sensor nodes communicating with a BAN (Body Area Node) Coordinator through Radio Frequency (RF) interface link. Recent advancements in the field of...
2016 / Niranjan N. Chiplunkar, K. Prabhakar Nayak, Durga Prasad -
Modelling Functional Behavior of Event-based Systems: A Practical Knowledge-based Approach
Abstract Functional behavior is considered to be the most basic, yet a critical notion in order to determine the characteristics of a system. However, how to reason about the functional behavior of a system in a systematic manner, is mostly limited...
2016 / Fahim T. Imam, Thomas R. Dean -
Multiuser chirp modulation for underwater acoustic channel based on VTRM2016 / Fei Yuan, Qian Wei, En Cheng
-
Mould calculus – On the secondary symmetries
Abstract Mould calculus is a powerful combinatorial tool that often provides some explicit formulae when there are no other available computational methods. It has a well-known interpretation/dictionary in terms of Hopf algebras. But this dictionary ...
2016 / Olivier Bouillot -
Mimic Visiting Styles by Using a Statistical Approach in a Cultural Event Case Study
Abstract Classifying the behaviours of users in the cultural spaces with the aim to infer knowledge about the event fruition is a fascinating challenge. In this paper, starting from real data, we are interested in predicting the user dynamics...
2016 / Salvatore Cuomo, Pasquale De Michele, Monica Pragliola, Gerardo Severino -
SIMON: Assisted Mobility for Older and Impaired Users
Abstract SIMON is a demonstration project with three large scale pilots in Madrid, Lisbon and Parma aiming to use ICT services to promote the independent living and societal participation of mobility impaired people in the context of on-street...
2016 / Eva Muñoz, Manuel Serrano, Manuel Vivó, Antonio Marqués, Alberto Ferreras, et al. -
Annotations of Connectives and Arguments in Malayalam Language
Abstract Discourse relations in natural languages link clauses in text and compose overall text structure. Discourse connectives are an important part of modeling the Malayalam discourse structure. We followed the annotation procedure of Penn...
2016 / S. Kumari Sheeja, Sobha Lalitha Devi -
Classification of Company-specific Influence Factors as Part of a Knowledge Management System for Ramp-up Projects
Abstract A targeted control of the ramp-up phase is of vital importance to the success of a new product. Shorter life cycles, higher rates of innovation, and an increasing number of variants make the ability to introduce products quickly to the...
2016 / Peter Bußwolder, Friedrich Burgahn, Marcel Hübner, Markus Werker -
Distance spectrum of Indu–Bala product of graphs
Abstract The D -eigenvalues μ 1 ...
2016 / G. Indulal, R. Balakrishnan -
Semi-supervised Approach to Romanian Noun Declension
Abstract Romanian is known for having a rich inflectional morphology due to the multitude of inflectional ending categories as well as due to stem alternations (apophony). This richness poses difficulties both for second language learners attempting ...
2016 / Şulea Octavia-Maria -
Application of Time Synchronization Process to Kerberos
Abstract Authentication in present day system environment, is a fundamental building block for secure access to organized assets. Kerberos is a symmetric key authentication framework that permits customers to safely access networked services. But...
2016 / Kameswara Rao, Bharadwaj, Nikhil Ram -
Online Support for the Elderly – Why Service and Social Network Platforms should be Integrated
Abstract Most developed countries currently face a demographic change towards an aging society. In this respect, the so-called transition age between 55 and 75 is crucial for individual health and wellbeing, since it usually is connected with the...
2016 / Friederike Boll, Philipp Brune -
Reversible Data Hiding in Videos for Better Visibility and Minimal Transfer
Abstract Performing data hiding in videos is very popular now. Video data hiding has large number of applications as it is more secure and also video has high frequency over the internet. When the amount of data to be embedded into the video...
2016 / M. Lakshmi, K.P. Arjun, N.M. Sreenarayanan, K.A. Arya -
CoMRing: A Framework for Community Detection Based on Multi-relational Querying Exploration
Abstract Community detection in multi-relational bibliographic networks is an important issue. There has been a surge of interest in community detection focusing on analyzing the linkage or topological structure of these networks. However,...
2016 / Soumaya Guesmi, Chiraz Trabelsi, Chiraz Latiri -
Cryptographically Enforced Data Access Control in Personal Health Record Systems
Abstract Personal Health Record (PHR) systems play a vital role during digital transformation of healthcare. These systems provide many value-added features like viewing one's health related information, secure transmission and tracking of that...
2016 / G.K. Ragesh, K. Baskaran -
Note on vertex and total proper connection numbers
Abstract This note introduces the vertex proper connection number of a graph and provides a relationship to the chromatic number of minimally connected subgraphs. Also a notion of total proper connection is introduced and a question is asked about a ...
2016 / Emily Chizmar, Colton Magnant, Pouria Salehi Nowbandegani