Computer and information sciences topic list of research papers
-
Leveraging Seminal Protocol Stacks to Support MANETs
Abstract In this paper, we investigate the suitability of some protocol stacks (mainly the UDP/IP model) that were firstly proposed for wired networks, to the mobile ad hoc networks (MANETs). These latter, are known to be dynamic as the topology is...
2012 / Mohamed Amine Abid, Abdelfettah Belghith -
Self-Regulating Action Exploration in Reinforcement Learning
Abstract The basic tenet of a learning process is for an agent to learn for only as much and as long as it is necessary. With reinforcement learning, the learning process is divided between exploration and exploitation. Given the complexity of the...
2012 / Teck-Hou Teng, Ah-Hwee Tan, Yuan-Sin Tan -
Final Semantics for Decorated Traces
Abstract In concurrency theory, various semantic equivalences on labelled transition systems are based on traces enriched or decorated with some additional observations. They are generally referred to as decorated traces, and examples include ready, ...
2012 / Filippo Bonchi, Marcello Bonsangue, Georgiana Caltais, Jan Rutten, Alexandra Silva -
Educational Soft Presenting Particularities Through Special Functions of ABAP List Viewer in Web Dynpro Technology
Abstract Web Dynpro technology is the present-day standard to develop Web applications in ABAP (or Java) programming SAP environment. The paper presents a didactic application of unitary presentation of some functions for the ABAP List Viewer (ALV)...
2012 / Mihaela Osaci, Adela-Diana Berdie, Lup Anca-Elisabeta -
Gross Error Detection and Data Reconciliation using Historical Data
Abstract With the information technology applied widely to process industry, a large amount of historical data which could be used for obtaining the prior probabilities of gross error occurrence is stored in database. To use the historical data to...
2011 / Shaochao Sun, Dao Huang, Yanxue Gong -
HDP-HMM-SCFG: A Novel Model for Trajectory Representation and Classification
Abstract In this paper, we propose a novel model, HDP-HMM-SCFG, for representing and classifying trajectories. Trajectories are represented by stochastic grammar, where trajectory segments are considered as observations emitted by the grammar...
2011 / Weiguang Xu, Yafei Zhang, Jianjiang Lu, Jiabao Wang -
Efficient Constraint/Generator Removal from Double Description of Polyhedra
Abstract We present an algorithm for the removal of constraints (resp., generators) from a convex polyhedron represented in the Double Description framework. Instead of recomputing the dual representation from scratch, the new algorithm tries to...
2014 / Gianluca Amato, Francesca Scozzari, Enea Zaffanella -
Integration of B Activity into a Global Design Process of Critical Software
Abstract The adequacy of the B method to produce a valid software implementation is well known, particularly in the guided transport domain. However, there is an important work to be performed using the informal specification before entering the B...
2012 / Philippe Bon, Simon Collart-Dutilleul, Dorian Petit -
A Review of Affective Design towards Video Games
Abstract Over the past decade, gaming has become a mainstream form of entertainment. It is one of the fastest growing forms of entertainment and has become a big business, easily rivaling the film industry in terms of consumer spending. However, due ...
2012 / Y.Y. Ng, C.W. Khong, H. Thwaites -
String analysis technique for shopping path in a supermarket2009 / Katsutoshi Yada
-
Modeling radio networks2011 / Calvin Newport, Nancy Lynch
-
Preface2006 / Peter Mosses, Irek Ulidowski
-
An adaptive large neighborhood search heuristic for Two-Echelon Vehicle Routing Problems arising in city logistics
Abstract In this paper, we propose an adaptive large neighborhood search heuristic for the Two-Echelon Vehicle Routing Problem (2E-VRP) and the Location Routing Problem (LRP). The 2E-VRP arises in two-level transportation systems such as those...
2012 / Vera C. Hemmelmayr, Jean-François Cordeau, Teodor Gabriel Crainic -
A Prolog Framework for the Rapid Prototyping of Language Processors with Attribute Grammars
Abstract In this paper, we describe PAG (Prototyping with Attribute Grammars), a framework for building Prolog prototypes from specifications based on attribute grammars, which we have developed for supporting rapid prototyping activities in an...
2006 / José Luis Sierra, Alfredo Fernández-Valmayor -
Bounded Model Checking with Parametric Data Structures
Abstract Bounded Model Checking (BMC) is a successful refutation method to detect errors in not only circuits and other binary systems but also in systems with more complex domains like timed automata or linear hybrid automata. Counterexamples of a...
2007 / Erika Ábrahám, Marc Herbstritt, Bernd Becker, Martin Steffen -
Source Transformation for Concurrency Analysis
Abstract Concurrent programming poses a unique set of problems for quality assurance. These difficulties include the complexities of deadlock, livelock and divergence, which can be extremely difficult to detect and debug. A variety of tools have...
2005 / Timothy Cassidy, James R. Cordy, Thomas R. Dean, Juergen Dingel -
Soft Constraints for Security
Abstract Integrity policies and cryptographic protocols have much in common. They allow for a number of participating principals, and consist of sets of rules controlling the actions that principals should or should not perform. They are intended to ...
2005 / Giampaolo Bella, Stefano Bistarelli, Simon N. Foley -
Preface2005 / Dina Goldin, Mirko Viroli
-
Checking Z Data Refinements Using Traces Refinement
Abstract Data refinement is useful in software development because it allows one to build more concrete specifications from abstract ones, as long as there is a mathematical relation between them. It has associated rules (proof obligations) that...
2009 / André Didier, Adalberto Farias, Alexandre Mota -
Keeping Secrets in Resource Aware Components
Abstract We present a powerful and flexible method for automatically checking the secrecy of values inside components. In our framework an attacker may monitor the external communication of a component, interact with it and monitor the components...
2007 / Tom Chothia, Jun Pang, Mohammad Torabi Dashti