Computer and information sciences topic list of research papers
-
A Hierarchy of SOS Rule Formats
Abstract In 1981 Structural Operational Semantics (SOS) was introduced as a systematic way to define operational semantics of programming languages by a set of rules of a certain shape [G.D. Plotkin. A structural approach to operational semantics....
2006 / Jan Friso Groote, Mohammad Reza Mousavi, Michel A. Reniers -
Concrete Memory Models for Shape Analysis
Abstract This paper discusses four store-based concrete memory models. We characterize memory models by the class of pointers they support and whether they use numerical or symbolic offsets to address values in a block. We give the semantics of a...
2010 / Pascal Sotin, Bertrand Jeannet, Xavier Rival -
Modeling and Reasoning about an Attacker with Cryptanalytical Capabilities
Abstract We propose a probabilistic framework for the analysis of security protocols. The proposed framework allows one to model and reason about attackers that extend the usual Dolev-Yao adversary with explicit probabilistic statements representing ...
2009 / Bruno Montalto, Carlos Caleiro -
Evaluating Complex MAC Protocols for Sensor Networks with APMC
Abstract In this paper we present an analysis of a MAC (Medium Access Control) protocol for wireless sensor networks. The purpose of this protocol is to manage wireless media access by constructing a Time Division Media Access (TDMA) schedule. APMC...
2007 / Michaël Cadilhac, Thomas Hérault, Richard Lassaigne, Sylvain Peyronnet, Sébastien Tixeuil -
Behaviour-Driven Development of Foundational UML Components
Abstract Behaviour-Driven Development (BDD) focuses all development activities on the delivery of behaviours – what a system should do, described such that developers and domain experts speak the same language. BDD frameworks allow users to...
2010 / Ioan Lazăr, Simona Motogna, Bazil Pârv -
Development Life-cycle of Critical Software Under FoCaL
Abstract Before their installation, critical systems must be assessed by an independent authority, who ensures that software components are really compliant with a set of requirements described in standards. Such standards describe the framework and ...
2009 / Philippe Ayrault, Thérèse Hardin, François Pessaux -
On the Computability of Blochs Constant
Abstract We prove the computability of Blochs constant by presenting the first algorithm for this constant.
2008 / Robert Rettinger -
Effect of local information transmission on mixed minority game
Abstract A mixed imitational minority game is proposed. Results show that system’s variance presents non-monotonous trend with increasing number N0 of imitational agent for small memory size m; while it increases with increasing N0 for large m,...
2010 / Yang Weisong, Tan Yong, Quan Hongjun -
Scheduling Algorithm used in Live Media Streaming Based on Data-drive Overlay Network
Abstract To improve the playback quality of P2P media streaming system terminal nodes and enhances the overall performance, a data scheduling algorithm(LDSA) is proposed, it is able to dynamically adjust the pending request according to the node...
2012 / Xu Na, Sun Shuang -
A semantic-based method for extracting concept definitions from scientific publications: evaluation in the autism phenotype domain2013 / Saeed Hassanpour, Martin J O’Connor, Amar K Das
-
Correction Strategies for the Use of a Conventional Micro-CT Cone Beam Machine for Metrology Applications
Abstract This paper describes the correction methods applied at the University of Zaragoza for the measurement of two items used in the first CT international inter-comparison (CT Audit) when using a non-measuring oriented CT machine. These methods...
2012 / R. Jiménez, S. Ontiveros, S. Carmignato, J.A. Yagüe -
Video Watermarking Scheme Based on MPEG-2 for Copyright Protection
Abstract An innovative practical video watermarking scheme based on MPEG-2 is proposed in this paper. By operating the compressed video data-stream directly, we embed watermarking information in DC coefficients of block image which is in the IDR...
2011 / Ming Jiang, Zhao-feng Ma, Xin-xin Niu, Yi-xian Yang -
The Universal Report System In The Power Systemwith Similar To The Excel
Abstract As top enterprise in China, the power supply companies should be excellent in the information tide wave, and they will realize the transformation from data processing to data mining. It is an attracting goal, but the fact is a little bit...
2012 / Li Yong-bin -
The Research of Information Filtering Technology Based on Bayesian Network
Abstract Information filtering research is currently a hot topic. The screening and filter information is for information according to the predetermined standard classification. The paper gives a use of Bayesian network method for information on the ...
2012 / Zhao Qingshan, Wu Shaobing, Cui Ying, Jia Xueming -
Based On GIS Oil And Gas Field Company Seismic Data Loading Quality Control System Architecture Design
Abstract Aim at long-standing problems that data lose, omission and loading errors in seismic data loading and quality control of Oil and Gas Field Company, this paper presents a software oriented system design scheme. This plan structures...
2011 / Jingyi Wu -
Numerical implementation of a real-time encryption system
Abstract In this work, we numerically implement an encryption system to be used for real-time encryption of audio and video signals. In such applications, the results obtained present in general a good performance: a low time processing that meets...
2012 / M.T. Ramírez-Torres, M. Mejía-Carlos, J.S. Murguía -
Home-Appliance Control using Mobile Cloud Technology in Web2.0 Platform
Abstract Cloud computing has been evolved as a key computing platform for sharing resources and services. People should have a relatively convenient environment for handling Home-appliances. Existing Home-Appliance control systems are not providing...
2012 / M. Amarnath -
Hybrid Approach for Detection of Anomaly Network Traffic using Data Mining Techniques
Abstract Anomaly based Intrusion Detection System (IDS) is getting popularity due to its adaptability to the changes in the behavior of network traffic as it has the ability to detect the new attacks. As it is very difficult to set any predefined...
2012 / Basant Agarwal, Namita Mittal -
Investigating Target Detection and Localization in Wireless Sensor Network
Abstract In this paper, the Wireless Sensor Network(WSN) has been developed for location tracking purposes. The two possible techniques of localization, namely the RSSI based and the hop count based, were investigated. For RSSI based technique, the...
2012 / Han Fei Min, Leong Wai Yie -
Performance Analysis of Text-Independent Speaker Identification System
Abstract In this paper, the text independent speaker identification system is implemented and analyzed using the speaker specific features extracted by applying image processing techniques. The speech is converted into spectrogram, an efficient...
2012 / K. Sekar