Computer and information sciences topic list of research papers
-
Video-Based Human Activity Recognition Using Multilevel Wavelet Decomposition and Stepwise Linear Discriminant Analysis2014 / Muhammad Siddiqi, Rahman Ali, Md. Rana, Een-Kee Hong, Eun Kim, et al.
-
Dynamic Bayesian Networks for Context-Aware Fall Risk Assessment2014 / Gregory Koshmak, Maria Linden, Amy Loutfi
-
Anonymous Connections Based on Onion Routing: A Review and a Visualization Tool
Abstract Anonymity of persons and services on the Internet has been an area of growing interest in academia and industry. In this paper, we review work on visualization tools for teaching information security and assurance. We then focus on concepts ...
2015 / Abdullah A. AlQahtani, El-Sayed M. El-Alfy -
Hviz: HTTP(S) traffic aggregation and visualization for network forensics
Abstract HTTP and HTTPS traffic recorded at the perimeter of an organization is an exhaustive data source for the forensic investigation of security incidents. However, due to the nested nature of today's Web page structures, it is a huge manual...
2015 / David Gugelmann, Fabian Gasser, Bernhard Ager, Vincent Lenders -
Customer Facilitated Cost-based Scheduling (CFCSC) in Cloud
Abstract Cloud computing is a prototype which takes the new form of utility computing. The on-demand flexible service and pay-per-use schemes provided by the Cloud providers attract the customers to move towards Cloud computing environment. Both the ...
2015 / D.I. George Amalarethinam, T. Lucia Agnes Beena -
Improving Indoor Positioning Accuracy with Dense, Cooperating Beacons
Abstract We improve indoor positioning location accuracy by opportunistically enlisting wireless client devices to temporarily serve as unmanaged beacons (or access points). A two-phase positioning scheme is proposed; in the initial phase, a target...
2014 / Jack Brassil -
Exchange of Knowledge in Customized Product Development Processes
Abstract If Customized Product Development is perceived as developing products that fulfill the customers individual requirements and in parallel reflect production constraints, such as manufacturing capabilities, a direct demand can be derived for...
2014 / Patrick Klein, Dante Pugliese, Johannes Lützenberger, Giorgio Colombo, Klaus-Dieter Thoben -
Distributionally Extended Network-based Word Sense Disambiguation in Semantic Clustering of Polish Texts
Abstract In the paper we present an extended version of the graph-based unsupervised Word Sense Disambiguation algorithm. The algorithm is based on the spreading activation scheme applied to the graphs dynamically built on the basis of the text...
2014 / Paweł Kędzia, Maciej Piasecki, Jan Kocoń, Agnieszka Indyka-Piasecka -
Learning-assisted theorem proving with millions of lemmas
Abstract Large formal mathematical libraries consist of millions of atomic inference steps that give rise to a corresponding number of proved statements (lemmas). Analogously to the informal mathematical practice, only a tiny fraction of such...
2014 / Cezary Kaliszyk, Josef Urban -
Educational App for Children with Autism Spectrum Disorders (ASDs)
Abstract Children with Autism Spectrum Disorders (ASDs) are usually diagnose by the disturbances in the following domains; social relatedness, communication/play, and restricted interests and activities. As a result, interacting and communicating...
2014 / Mohd Z.A. Aziz, Syahrul A.C. Abdullah, Syed F.S. Adnan, Lucyantie Mazalan -
Membrane parallelism for discrete Morse theory applied to digital images2015 / Raúl Reina-Molina, Daniel Díaz-Pernil, Pedro Real, Ainhoa Berciano
-
Achieve Significant Throughput Gains in Wireless Networks with Large Delay-Bandwidth Product
Abstract Traditionally, Bandwidth-Delay Product can be used to measure the capacity of network “pipe” between two nodes. However, in multi-hop wireless networks, Bandwidth-Delay Product cannot reveal the network condition accurately. In this paper,...
2014 / Jiamian Wang, Weidong Liu -
Ranking of Journals in Science and Technology Domain: A Novel and Computationally Lightweight Approach
Abstract In this paper, a regression analysis based method is proposed to calculate the Journal Influence Score. This Influence Score is used to measure the scientific influence of scholarly journals. Journal Influence Score is calculated by using...
2014 / Neelam Jangid, Snehanshu Saha, Siddhant Gupta, J. Mukunda Rao -
A Robust Scheduling Approach for a Single Machine to Optimize a Risk Measure
Abstract Robustness in scheduling addresses the capability of devising schedules which are not sensitive – to a certain extent – to the disruptive effects of unexpected events. The paper presents a novel approach for protecting the quality of a...
2014 / Marcello Urgo, József Váncza -
A representation scheme for digital product service system definitions
Abstract The growing trend for delivering physical products to customers as parts of product service systems (PSS) is creating a need for a new generation of Computer Aided Design (CAD) system to support the design of PSS: so-called “PSS-CAD”. Key...
2014 / Alison McKay, Saikat Kundu -
Model-based Evaluation of Scalability and Security Tradeoffs: a Case Study on a Multi-Service Platform
Abstract Current ICT infrastructures are characterized by increasing requirements of reliability, security, performance, availability, adaptability. A relevant issue is represented by the scalability of the system with respect to the increasing...
2015 / Leonardo Montecchi, Nicola Nostro, Andrea Ceccarelli, Giuseppe Vella, Antonio Caruso, et al. -
The Human Factor of Information Security: Unintentional Damage Perspective
Abstract It is widely acknowledged that employees of an organization are often a weak link in the protection of its information assets. Information security has not been given enough attention in the literature in terms of the human factor effect;...
2014 / Efthymia Metalidou, Catherine Marinagi, Panagiotis Trivellas, Niclas Eberhagen, Christos Skourlas, et al. -
Downward pattern refinement for timed automata2014 / Martin Wehrle, Sebastian Kupferschmid
-
The Stochastic Simplex Bisection Algorithm
Abstract We propose the stochastic simplex bisection algorithm. It randomly selects one from a set of simplexes, bisects it, and replaces it with its two offspring. The selection probability is proportional to a score indicating how promising the...
2015 / Christer Samuelsson -
Comparing Security Notions of Secret Sharing Schemes2015 / Songsong Dai, Donghui Guo