Computer and information sciences topic list of research papers
-
Handling Data-skew Effects in Join Operations Using MapReduce
Abstract For over a decade, MapReduce has become a prominent programming model to handle vast amounts of raw data in large scale systems. This model ensures scalability, reliability and availability aspects with reasonable query processing time....
2014 / M. Al Hajj Hassan, M. Bamha, F. Loulergue -
Hypergraph Grammar based Adaptive Linear Computational Cost Projection Solvers for Two and Three Dimensional Modeling of Brain
Abstract In this paper we present a hypergraph grammar model for transformation of two and three dimensional grids. The hypergraph grammar concerns the proces of generation of uniform grids with two or three dimensional rectangular or hexahedral...
2014 / Damian Goik, Marcin Sieniek, Maciej Woźniak, Anna Paszyńka, Maciej Paszyński -
Codebook Selection Strategies in Long-range Sub-1GHz WLANs
Abstract The new long-range WLANs will enable a simple and cost-efficient setup of wireless ambient systems, including smart city and smart grid communication networks. The emerging IEEE 802.11ah WLAN standard utilizes carrier frequencies at 900MHz...
2014 / Stefan Aust, Venkatesha Prasad, Ignas G.M.M. Niemegeers -
Speeding up multiple instance learning classification rules on GPUs2014 / Alberto Cano, Amelia Zafra, Sebastián Ventura
-
Cyber Defense of Space-based Assets: Verifying and Validating Defensive Designs and Implementations
Abstract The evolving nature of a malicious and persistent threat is unlike traditional environmental hazards to space flight missions, such as radiation. Consequently, engineering mission systems to be resilient to this new generation of threats...
2014 / D.J. Byrne, David Morgan, Kymie Tan, Bryan Johnson, Chris Dorros -
Comparison by Simulation of Energy Consumption and WSN Lifetime for LEACH and LEACH-SM
Abstract Extending the period of operation (lifetime) of wireless sensor networks (WSNs) is one of the most critical issues. Lifetime limitations are due to limited energy resources. Available research results reveal that significant improvement in...
2014 / Bilal Abu Bakr, Leszek T. Lilien -
Reaching Consensus in Digital Libraries: A Linguistic Approach
Abstract Libraries are recently changing their classical role of providing stored information into new virtual communities, which involve large number of users sharing real time information. Despite of those good features, there is still a necessity ...
2014 / I.J. Pérez, F.J. Cabrerizo, J.A. Morente-Molinera, R. Ureña, E. Herrera-Viedma -
Sinkhole Attack Detection based on Redundancy Mechanism in Wireless Sensor Networks
Abstract Wireless sensor networkshas a bright future because of its low-cost, save-power, and easy implementation .etc. However, its security problems have become hot research topics in many applications. Sinkhole attack is just one of frequently...
2014 / Fang-Jiao Zhang, Li-Dong Zhai, Jin-Cui Yang, Xiang Cui -
Formalization of Learning Objects for Image-based Language Learning in Mobile Environments
Abstract Current mobile learning approaches demand for combining learning media and resources, open communities and customizable tool for individuals. We have focused on the formalization of learning digital resources using the Formal Learning...
2014 / Oleg Starostenko, Claudia Perez-Lezama, V. Alarcon-Aquino, J. Alfredo Sanchez -
A Cross-layer Loss Discrimination Scheme for DCCP over the Wireless Network
Abstract DCCP (Datagram Congestion Control Protocol) is a transport layer protocol that provides congestion control for unreliable data transmission. The congestion control mechanism embedded in DCCP adjusts the packet sending rate according to...
2014 / Chung-Ming Huang, Yuan-Tse Yu, Yu-Jen Huang -
5G Wireless Mesh Network 802.11s Load Balancing Architecture for 802.11 Bgn Radio-PCI Interface
Abstract The real time verification and validation process for WLAN is becoming essential for the users whose data falls on wide characteristics requirements such as video centric and high bandwidth. Nature of channel being broadcast and presence of ...
2016 / N. GokulRaj, K. Umapathy -
Algorithms for Automatic, Real-time Tsunami Detection in Wind-wave Measurements: Using Strategies and Practical Aspects
Abstract The present paper concentrates on the actual use - in the framework of a Tsunami Early Warning System - of the algorithms to be implemented in the software of wind-wave gages in order to automatically perform the real-time detection of...
2014 / M. Di Risio, G.M. Beltrami -
A Memory-efficient Bounding Algorithm for the Two-terminal Reliability Problem
Abstract The terminal-pair reliability problem, i.e. the problem of determining the probability that there exists at least one path of working edges connecting the terminal nodes, is known to be NP-hard. Thus, bounding algorithms are used to cope...
2013 / Minh Lê, Max Walter, Josef Weidendorfer -
Quantum structure in competing lizard communities
Abstract Almost two decades of research on applications of the mathematical formalism of quantum theory as a modeling tool in domains different from the micro-world has given rise to many successful applications in situations related to human...
2014 / Diederik Aerts, Jan Broekaert, Marek Czachor, Maciej Kuna, Barry Sinervo, et al. -
Supporting secure programming in web applications through interactive static analysis
Abstract Many security incidents are caused by software developers’ failure to adhere to secure programming practices. Static analysis tools have been used to detect software vulnerabilities. However, their wide usage by developers is limited by the ...
2013 / Jun Zhu, Jing Xie, Heather Richter Lipford, Bill Chu -
Checking geometric programs or verification of geometric structures
Abstract A program checker verifies that a particular program execution is correct. We give simple and efficient program checkers for some basic geometric tasks. We report about our experiences with program checking in the context of the LEDA...
2002 / Kurt Mehlhorn, Stefan Näher, Michael Seel, Raimund Seidel, Thomas Schilz, et al. -
Implied Scenario Detection in the Presence of Behaviour Constraints1 1Partially supported by EPSRC Grant GR/M24493 (BEADS Project).
Abstract Scenario-based specifications describe how independent components interact to provide system level behaviour. The specified system decomposition and system behaviour can give rise to implied scenarios, which are the result of specifying the ...
2004 / Sebastian Uchitel, Jeff Kramer, Jeff Magee -
Dialgebraic Logics
Abstract We extend the notion of a first–order signature in such a way that the type constructors used to define domain and codomain of the fundamental operations are taken to be a constituent part of the signature. Using the generative power of the ...
2004 / Horst Reichel -
On-demand Evaluation by Program Transformation1 1Work partially supported by CICYT TIC2001-2705-C03-01 and MCYT grants HA2001-0059 and HU2001-0019.
Abstract Strategy annotations are used in eager programming languages (e.g., OBJ2, OBJ3, CafeOBJ, and Maude) for improving efficiency and/or reducing the risk of nontermination. Syntactically, they are given either as lists of natural numbers or as...
2004 / María Alpuente, Santiago Escobar, Salvador Lucas -
Generating Processes from Specifications using the Relation Manipulation System RelView
Abstract In this paper we present an algorithm generating a bundle of processes from a given safety specification. The specification is given by a formula in a process logic, i.e. a modal logic with a set of possibility operators induced by the...
2004 / Michael Winter