Computer and information sciences topic list of research papers
-
Cryptanalysis of Lee et al.’s authenticated group key agreement
Abstract Authenticated key agreement protocols are to authenticate the users who will start a conversation and establish a common session key. In 2009, Cheng-chi Lee et al. proposed a new authenticated group key agreement based on a novel bilinear...
2011 / Wei Yuan, Liang Hu, Hongtu Li, Jianfeng Chu -
Polarity Words Distance-Weight Count For Opinion Analysis Of Online News Comments
Abstract The main tasks of Opinion Analysis of Online News comments are comment objects identification and determining polarities of comments. As most online comments are short sentences, the comment polarity should be analyzed on sentences level....
2011 / Suhuan Sun, Gongsheng Kong, Changwei Zhao -
The Design of Dynamic Coordination Architecture and Supporting Platform for Agile Supply Chain
Abstract Agile Supply Chain Dynamic Alliance based on the formation and rapid disintegration of the reconstruction and adjustment. Integrity of the agile supply chain can improve the coordination mechanism between enterprises and the supply-demand...
2011 / Daoping Wang, Yao Zhao, Hongli Wang -
Security of communities based on the e-JIKEI Network with information technology and altruism
Abstract Attempts on the introduction of systems of the e-JIKEI Network, a novel concept on operating security camera system, are reviewed. The concept of the e-JIKEI Network is that a community will have a strong ability to prevent crime only if...
2010 / Koichi Maru, Yusaku Fujii, Yoichi Sugita, Naoya Ohta, Noriaki Yoshiura, et al. -
Computing convex quadrangulations
Abstract We use projected Delaunay tetrahedra and a maximum independent set approach to compute large subsets of convex quadrangulations on a given set of points in the plane. The new method improves over the popular pairing method based on...
2011 / T. Schiffer, F. Aurenhammer, M. Demuth -
On the Design of Peer Punishment Experiments2005 / Marco Casari
-
Wi-Fi Security Analysis
Abstract In recent years, a significant increasing in development of Wireless networks is noticed; they become an entire part of the Internet and demonstrate effectiveness in handling communication for reduced public LAN and military applications....
2015 / Tahar Mekhaznia, Abdelmadjid Zidani -
Ontology Change Management and Identification of Change Patterns2013 / Muhammad Javed, Yalemisew M. Abgaz, Claus Pahl
-
Transformation of Hand-Shape Features for a Biometric Identification Approach2012 / Carlos M. Travieso, Juan Carlos Briceño, Jesús B. Alonso
-
Preface2012 / Puri Arenas, Víctor M. Gulías
-
A new approach to cluster analysis: the clustering-function-based method2006 / Baibing Li
-
Particle swarm inspired optimization algorithm without velocity equation
Abstract This paper introduces Particle Swarm Without Velocity equation optimization algorithm (PSWV) that significantly reduces the number of iterations required to reach good solutions for optimization problems. PSWV algorithm uses a set of...
2011 / Mahmoud Mostafa El-Sherbiny -
An adaptive meta-search engine considering the user’s field of interest
Abstract Existing meta-search engines return web search results based on the page relevancy to the query, their popularity and content. It is necessary to provide a meta-search engine capable of ranking results considering the user’s field of...
2011 / Hamid Hassanpour, Farzaneh Zahmatkesh -
β-Approach to near set theory
Abstract The aim of this paper is to introduce two approaches to near sets by using topological structures and β-open sets. Some fundamental properties and characterizations are given. We obtain a comparison between these types of approximations and ...
2011 / M.E. Abd El-Monsef, A.M. Kozae, E.A. Marei -
Robust Indoor Localization on a Commercial Smart Phone
Abstract Low-cost localization solutions for indoor environments have a variety of real-world applications ranging from emergency evacuation to mobility aids for people with disabilities. In this paper, we introduce a methodology for indoor...
2012 / Nisarg Kothari, Balajee Kannan, Evan D. Glasgwow, M. Bernardine Dias -
An Innovative Teaching Tool for the Verification of Abstract Data Type Implementations from Formal Algebraic Specifications
Abstract This paper presents an educational tool for testing abstract data types implemented in C++ against formal algebraic specifications written in Maude, a formal specification language based on rewriting logic that allows the specification of...
2012 / Rafael del Vado Víırseda, Fernando Pérez Morente -
Challenges of Reducing Cycle-accurate Simulation Time for TBP Applications
Abstract Cycle-accurate simulation is an important tool that depends on the computational power of supercomputers. Unfortunately, simulations of modern multi-core platforms can take weeks or months. In this paper, we look into the challenges of...
2013 / Alexandru C. Iordan, Magnus Jahre, Lasse Natvig -
Literate Program Execution for Teaching Computational Science
Abstract Class material for computer science courses often contains algorithms and code snippets, as well as the results of their execution. Usually, these are written and tested outside the source document then included via copy-and-paste. Making...
2012 / Sébastien Li-Thiao-Té -
The tree clustering technique and the physical reality of galaxy groups
Abstract In this paper the tree clustering technique (the Euclidean separation distance coefficients) is suggested to test how the Hickson compact groups of galaxies (HCGs) are really physical groups. The method is applied on groups of 5 members...
2013 / M.A. Sabry, I.A. Issa, H. Abdelrahman, A.A. Shaker -
Performance Evaluation of Levenberg-Marquardt Technique in Error Reduction for Diabetes Condition Classification
Abstract This paper aims to provide a case study to classify diabetes medical condition amongst patients. The study examines the performance of the Levenberg-Marquardt (LM) algorithm on a single dataset, the Pima Indian Diabetes dataset, attempting...
2013 / Nawaz Khan, Dhara Gaurav, Thomas Kandl