Computer and information sciences topic list of research papers
-
Encoding Catalytic P Systems in π@
Abstract P systems are theoretical computing devices abstracted away from the biological architecture of the cell, introduced some years ago by Gheorghe Păun and now intensely studied. In the area of concurrent systems, process calculi have recently ...
2007 / Cristian Versari -
Adjuncts elimination in the static ambient logic
Abstract The Ambient Logic (AL) has been proposed for expressing spatial properties of processes of the Mobile Am- bient calculus (MA). Restricting both the calculus and the logic to their static part yields static ambients (SA) and the static...
2004 / Étienne Lozes -
Fresco: Flexible and Reliable Evolution System for Components
Abstract Fresco is a methodology that allows for the dynamic adaptation of component-oriented applications. Fresco aims to support the developer in the realization of dynamic adaptation throughout the entire life cycle of a component. At design...
2005 / Yves Vandewoude, Yolande Berbers -
Model-checking Web Services Orchestrations using BP-calculus
Abstract The Business Process Execution Language for Web Services (BPEL) is the standard for implementing orchestrated business processes designed but not limited to, as web services. BPEL is a powerful language but lacks a widely accepted formal...
2009 / Faisal Abouzaid, John Mullins -
Game-Based Probabilistic Predicate Abstraction in PRISM
Abstract Modelling and verification of systems such as communication, network and security protocols, which exhibit both probabilistic and non-deterministic behaviour, typically use Markov Decision Processes (MDPs). For large, complex systems,...
2008 / Mark Kattenbelt, Marta Kwiatkowska, Gethin Norman, David Parker -
Integrating Textual and Graphical Modelling Languages
Abstract Graphical diagrams are the main modelling constructs offered by the popular modelling language UML. Because textual representations of models also have their benefits, we investigated the integration of textual and graphical modelling...
2010 / Luc Engelen, Mark van den Brand -
Hiproofs: A Hierarchical Notion of Proof Tree
Abstract Motivated by the concerns of theorem-proving, we generalise the notion of proof tree to that of hierarchical proof tree. Hierarchical trees extend ordinary trees by adding partial order structure to the set of nodes: that allows us to...
2006 / Ewen Denney, John Power, Konstantinos Tourlas -
Refinement for User Interface Designs
Abstract Formal approaches to software development require that we correctly describe (or specify) systems in order to prove properties about our proposed solution prior to building it. We must then follow a rigorous process to transform our...
2008 / Judy Bowen, Steve Reeves -
Enforcing Concurrent Temporal Behaviors
Abstract The outcome of verifying software is often a 'counterexample', i.e., a listing of the actions and states of a behavior not satisfying the specification. In order to understand the reason for the failure it is often required to test such an...
2005 / Doron Peled, Hongyang Qu -
Bisimulation and Simulation Relations for Markov Chains
Abstract Formal notions of bisimulation and simulation relation play a central role for any kind of process algebra. This short paper sketches the main concepts for bisimulation and simulation relations for probabilistic systems, modelled by...
2006 / Christel Baier, Holger Hermanns, Joost-Pieter Katoen, Verena Wolf -
Computing by Floating Strings
Abstract We propose a biologically inspired system which computes on double structures of mobile strings by means of rewriting rules that have a biotechnological implementation, by resembling DNA computations. Its computational universality may be...
2007 / Giuditta Franco, Maurice Margenstern -
A Bayesian Model for Event-based Trust
Abstract The application scenarios envisioned for ‘global ubiquitous computing’ have unique requirements that are often incompatible with traditional security paradigms. One alternative currently being investigated is to support security...
2007 / Mogens Nielsen, Karl Krukow, Vladimiro Sassone -
Extensionality of Spatial Observations in Distributed Systems
Abstract We discuss the tensions between intensionality and extensionality of spatial observations in distributed systems, showing that there are natural models where extensional observational equivalences may be characterized by spatial logics,...
2007 / Luís Caires, Hugo Torres Vieira -
Coalgebraic Description of Generalized Binary Methods
Abstract We extend the Reichel-Jacobs coalgebraic account of specification and refinement of objects and classes in Object Oriented Programming to (generalized) binary methods. These are methods that take more than one parameter of a class type....
2006 / Furio Honsell, Marina Lenisa, Rekha Redamalla -
On-The-Fly Path Reduction
Abstract Path reduction is a well-known technique to alleviate the state-explosion problem incurred by explicit-state model checking, its key idea being to store states only at predetermined breaking points. This paper presents an adaptation of this ...
2011 / Sebastian Biallas, Jörg Brauer, Dominique Gückel, Stefan Kowalewski -
An Evaluation of the Effortless Approach to Build Algorithm Animations with WinHIPE
Abstract The use of algorithm visualizations in computer science education is not a new thing. Although there is a firm belief that graphical representations of algorithms are learning aids, empirical studies show that what is important is what the...
2007 / Jaime Urquiza-Fuentes, J. Ángel Velázquez-Iturbide -
Network Test System Design and Implementation
Abstract With the popularity of computer networks, the network test has widely used as one of test formats, and will be a major test format. However, with the continuous development of network test system, security has received increasing attention. ...
2012 / Shuaiwen Xu, Xiaoming Wang -
On the Unified Authentication Technology of Network Token
Abstract This paper has researches on the achievement of unified authentication. It uses Windows Active Directory as the authentication authority. It uses Kerberos, SPNEGO, JAAS and JGSS to achieve unified authentication service with single...
2012 / Wang Chao, Huang Zhaohe, Peng Erbao -
Developing an Automated Mechanism for Cluster Computing in Computerized Classroom
Abstract Scientific computing has become one of the key players in the advance of modern science and technologies. In the meantime, due to the success of developments in processor fabrication, the computing power of Personal Computer (PC) is not to...
2011 / Shuen-Tai Wang, Chin-Hung Li, Hsi-Ya Chang, Ying-Chuan Chen, Ching-Hsien Hsu -
Image compression using single layer linear neural networks
Abstract Images and text form an integral part of website designing. Images have an engrossing appeal and that’s why they attract more and more visitors. But, due to expensive bandwidth and time-consuming downloads; it has become essential to...
2010 / B. Arunapriya, D. Kavitha Devi