Computer and information sciences topic list of research papers
-
Automatic Transformation of Data Warehouse Schema to NoSQL Data Base: Comparative Study
Abstract Driven by the ever-growing of data from social network (SN), data warehouse (DW) approaches must be adapted. Generally the star, snowflake or constellation models are used as logical ones. All these models are inadequate when dealing with...
2016 / Rania Yangui, Ahlem Nabli, Faiez Gargouri -
Security-by-design in Clouds: A Security-SLA Driven Methodology to Build Secure Cloud Applications
Abstract This paper presents a security-by-design methodology for the development of cloud applications, which relies on Security SLAs as a means to express their security requirements. The process followed to build such Security SLAs entails the...
2016 / Valentina Casola, Alessandra De Benedictis, Massimiliano Rak, Erkuden Rios -
High-productivity Framework for Large-scale GPU/CPU Stencil Applications
Abstract A high-productivity framework for multi-GPU and multi-CPU computation of stencil applications is proposed. Our framework is implemented in C++ and CUDA languages. It automatically translates user-written stencil functions that update a grid ...
2016 / Takashi Shimokawabe, Takayuki Aoki, Naoyuki Onodera -
Greenness Link State Advertisement Extension for WDM Networks
Abstract This paper introduces a new Link State Advertisement (LSA) for a new link characteristic to be used with Constrained Open Shortest Path (CSPF) routing mechanism. The new LSA is to be exploited for building a topology database based on...
2016 / Alireza Nafarieh, Yashar Fazili, Mohammad Raza, William Robertson -
A Novel Illumination Invariant Face Recognition Method Based on PCA and WPD Using YCbCr Color Space
Abstract Today, much research on face recognition has focused on using grey-scale images. With the increasing availability of color images, it makes sense to develop approaches for integrating color information into recognition process as the...
2016 / Archana H. Sable, Sanjay N. Talbar -
A Two Stage Data Hiding Scheme with High Capacity Based on Interpolation and Difference Expansion
Abstract A data hiding technique embeds secret information into a cover image. Cover image and the stego image look similar due to which the hackers fail to detect the presence of the hidden secret data. In this paper we propose a two stage data...
2016 / P.V. Sabeen Govind, M.K. Sajila, Bindiya M. Varghese -
Assessing Metaheuristics by Means of Random Benchmarks
Abstract Typically, the performance of swarm and evolutionary methods is assessed by comparing their results when applied to some known finite benchmarks. In general, these metaheuristics depend on many parameter values and many possible...
2016 / Pablo Rabanal, Ismael Rodríguez, Fernando Rubio -
Vowel Analysis for Indian English
Abstract In the area of speech recognition accent plays a vital role. In this paper, we focus on the accent variations in Indian English with emphasis on the vowel analysis. Vowel analysis for Indian English is not performed extensively. In the...
2016 / Disha Kaur Phull, G. Bharadwaja Kumar -
Test Site AIM – Toolbox and Enabler for Applied Research and Development in Traffic and Mobility
Abstract The Application Platform for Intelligent Mobility (AIM) is a test site for research and development in the domain of intelligent mobility services, which resides in the city of Braunschweig and in parts of the circumjacent regions. The test ...
2016 / Sascha Knake-Langhorst, Kay Gimm, Tobias Frankiewicz, Frank Köster -
Illustrative Signature Keys Reconfiguration to Combat with Eavesdroppers in Wavelength-coded Optical Access Networks
Abstract In order to enhance data transmission security within internet network, this paper consider a signature reconfiguration scheme over wavelength-coded network coder/decoders (codecs). We propose the reconfiguration scheme of composite...
2016 / Jen-Fa Huang, Kai-Sheng Chen, Ting-Ju Su -
Advanced Immediate Crime Reporting to Police in India
Abstract One of most important area in Crime investigation is efficient way of reporting crime. Till now, crime reporting system in India is online FIR system or manual reporting in Police stations. If any incident happens in any area, then crime...
2016 / Divya Lal, Adiba Abidin, Naveen Garg, Vikas Deep -
A Comparison of Concept-base Model and Word Distributed Model as Word Association System
Abstract We construct Concept-base based on concept chain model and word vector spaces based on Word2Vec using EDR-electronic- dictionary and Japanese Wikipedia data. This paper describes verification experiments of these models regarding the word...
2016 / Akihiro Toyoshima, Noriyuki Okumura -
SoK: Making Sense of Censorship Resistance Systems2016 / Sheharbano Khattak, Tariq Elahi, Laurent Simon, Colleen M. Swanson, Steven J. Murdoch, et al.
-
Mastering Complexity with Autonomous Production Processes
Abstract For the consolidation and improvement of a companies market position it is necessary to master the increased complexity of production processes with suitable methods. This paper will examine whether and how far autonomous production...
2016 / Hanna Theuer, Sander Lass -
Analysis of In-line Quality-oriented Assembly Strategies in the Production of Electric Drives
Abstract This paper presents the analysis of quality-oriented rotor assembly strategies in electric drive production systems. These approaches combine quality-oriented system policies and an improved rotor assembly technique. In order to analyze...
2016 / Marcello Colledani, Anteneh Yemane, Alex Tognetti -
Faster cloud Star Joins with Reduced Disk Spill and Network Communication
Abstract Combining powerful parallel frameworks and on-demand commodity hardware, cloud computing has made both analytics and decision support systems canonical to enterprises of all sizes. Associated with unprecedented volumes of data stacked by...
2016 / Jaqueline Joice Brito, Thiago Mosqueiro, Ricardo Rodrigues Ciferri, Cristina Dutra de Aguiar Ciferri -
Network Services and Their Compositions for Network Science Applications
Abstract Network science is moving more and more to computing dynamics on networks (so-called contagion processes), in addition to computing structural network features (e.g., key players) and other parameters. Generalized contagion processes impose ...
2016 / Sherif Elmeligy Abdelhamid, Chris J. Kuhlman, Madhav V. Marathe, S.S. Ravi -
PARLOMA – A Novel Human-Robot Interaction System for Deaf-Blind Remote Communication2015 / Ludovico Orlando Russo, Giuseppe Airò Farulla, Daniele Pianu, Alice Rita Salgarella, Marco Controzzi, et al.
-
Enforcement of opacity security properties for ship information system2016 / Bowen Xing, Jin Dai, Sheng Liu
-
Identification and impact of discoverers in online social systems2016 / Matúš Medo, Manuel S. Mariani, An Zeng, Yi-Cheng Zhang