Computer and information sciences topic list of research papers
-
Thinking process rules extraction for manufacturing process design2017 / Jing-Tao Zhou, Xiang-Qian Li, Ming-Wei Wang, Rui Niu, Qing Xu
-
Attribute-based encryption implies identity-based encryption2017 / Javier Herranz
-
Trust and Risk Assessment Model of Popular Software Based on Known Vulnerabilities2017 / Marek Janiszewski, Anna Felkner, Jakub Olszak
-
Independent feedback vertex sets for graphs of bounded diameter
Abstract The Near-Bipartiteness problem is that of deciding whether or not the vertices of a graph can be partitioned into sets A and B, where A is an independent set and B induces a forest. The set A in such a partition is said to be an independent ...
2017 / Marthe Bonamy, Konrad K. Dabrowski, Carl Feghali, Matthew Johnson, Daniël Paulusma -
On the Complexity of Computing MP Distance Between Binary Phylogenetic Trees2017 / Steven Kelk, Mareike Fischer
-
On Neutrosophic Soft Linear Spaces
Abstract The concept of neutrosophic soft linear space (NSLS) is introduced and its several related properties and structural characteristics are investigated in this paper with suitable examples. Then cartesian product of neutrosophic soft linear...
2017 / Tuhin Bera, Nirmal Kumar Mahapatra -
Uncertainty-wise evolution of test ready models
Abstract Context Cyber-Physical Systems (CPSs), when deployed for operation, are inherently prone to uncertainty. Considering their applications in critical domains (e.g., healthcare), it is important that such CPSs are tested...
2017 / Man Zhang, Shaukat Ali, Tao Yue, Roland Norgre -
On the structure of dynamic principal component analysis used in statistical process monitoring
Abstract When principal component analysis (PCA) is used for statistical process monitoring it relies on the assumption that data are time independent. However, industrial data will often exhibit serial correlation. Dynamic PCA (DPCA) has been...
2017 / Erik Vanhatalo, Murat Kulahci, Bjarne Bergquist -
A note on structured pseudospectra of block matrices
Abstract In this note we consider the question of equivalence of pseudospectra and structured pseudospectra of block matrices. The structures we study are all so called double structures; that is, the blocks of the given matrix are of the same...
2017 / Richard Ferro, Jani A. Virtanen -
Notification that new names and new combinations have appeared in volume 54, part 1, of the IJSEM2004 /
-
A Multi-Agent Framework for Ambient Systems Development
Abstract This paper proposes a multi-agent framework to support applications development of ambient systems. In the programming model of the framework, ambient systems can be developed by collaboration of mobile agents and service (or resident)...
2011 / Xiping Hu, Weichang Du, Bruce Spencer -
Random Coding for Distributed Network based on the Vandermonde Matrix
Abstract In this paper the rank criterion of realizing the maximum information transmission based on the topology of encoding nodes is first derived. Then the Vandermonde matrix-based distributed random network coding approach is proposed, which can ...
2012 / Gong Maokang, Song Qi -
τ(G) and the Existence of Factors
Abstract Let G is a graph: When G is not completely graphτ(G) = min {|S|/ω(G−S)−1: S⊆V(G),and ω(G−S)≥2}; When G is completely graph,τ(G) = ∞. Which ω(G−S) is the number of branches of G-S. In this paper we give a result It is proved that the...
2012 / YaYa Wang, Yun Gao, Xiangguang He, Wei Gao -
Decentralized Checking Context Inconsistency in Ubiquitous Mobile Computing Environments
Abstract Contexts are often noisy in ubiquitous mobile computing environments due to user mobility, unreliable wireless connectivity and resource constraints. Various schemes have been proposed to check context inconsistency for ubiquitous mobile...
2012 / Daqiang Zhang, Zhijun Yang, Hongyu Huang, Qin Zou -
Research and Design of the Three-tier Distributed Network Management System Based on COM / COM + and DNA
Abstract Considered on the distributed network management system's demand of high distributives, extensibility and reusability, a framework model of Three-tier distributed network management system based on COM/COM+ and DNA is proposed, which adopts ...
2012 / Likai Liang, Yushen Bi -
Reduction and Refinement
Abstract In this paper we explore the relation between refinement and reduction, especially as it is used in the context of cryptography. We show how refinement is a special case of reduction, and more interestingly, how reduction is an instance of...
2008 / Eerke Boiten, Dan Grundy -
Model Based Testing of a Network-on-Chip Component
Abstract We discuss the problem of model based test case generation and that of automatic testing of a component of an asynchronous Network-on-Chip (NoC). We start with a model of the component in B Action System, which is a state based formalism...
2009 / Leonidas Tsiopoulos, Manoranjan Satpathy -
An Effective Coalgebraic Bisimulation Proof Method
Abstract The bisimulation “up-to-…” technique provides an effective way to relieve the amount of work in proving bisimilarity of two processes. This paper develops a fresh and direct approach to generalize this set-theoretic “up-to-...” principle to ...
2008 / Lingyun Luo -
Finding Similarities in Source Code Through Factorization
Abstract The high availability of a huge number of documents on the Web makes plagiarism very attractive and easy. This plagiarism concerns any kind of document, natural language texts as well as more structured information such as programs. In...
2009 / Michel Chilowicz, Étienne Duris, Gilles Roussel -
Automatic Verification of Bossa Scheduler Properties
Abstract Bossa is a development environment for operating-system process schedulers that provides numerous safety guarantees. In this paper, we show how to automate the checking of safety properties of a scheduling policy developed in this...
2007 / Jean-Paul Bodeveix, Mamoun Filali, Julia L. Lawall, Gilles Muller