Computer and information sciences topic list of research papers
-
Augmented Reality in Logistics
Abstract This paper describes the basic elements of logistics and pays special attention to improvement possibilities in packaging, handling, storage and transportation phases where manpower and personnel also play an important role. To decrease the ...
2013 / Arnis Cirulis, Egils Ginters -
Filtering of Background DNA Sequences Improves DNA Motif Prediction Using Clustering Techniques
Abstract Noisy objects have been known to affect negatively on the performance of clustering algorithms. This paper addresses the problem of high false positive rates in using self-organizing map (SOM) for DNA motif prediction due to the noisy...
2013 / Nung Kion Lee, Allen Chieng Hoon Choong -
Seminar Text of German in Blended Learning
Abstract The paper starts wit h the characteristics of selected coherent text and it introduces some criteria of such a selection. The focus of the article is in the description of methods used in seminar lesson teaching and in listing of topics...
2014 / Sarka Hubackova -
On the database lookup problem of approximate matching
Abstract Investigating seized devices within digital forensics gets more and more difficult due to the increasing amount of data. Hence, a common procedure uses automated file identification which reduces the amount of data an investigator has to...
2014 / Frank Breitinger, Harald Baier, Douglas White -
Efficient Measurement of the User Experience. A Portuguese Version
Abstract For the international use of software products it is important to know the culture, language and behavior of the citizens. Means: internationalization and location. To be able to evaluate these products it is significant to know how people...
2014 / Manuel Pérez Cota, Jörg Thomaschewski, Martin Schrepp, Ramiro Gonçalves -
Quality of Service Conflict During Web Service Monitoring: A Case Study
Abstract Web services have become one of the most used technologies in service-oriented systems. Its popularity is due to its property to adapt to any context. As a consequence of the increasing number of Web services on the Internet and its...
2016 / Jael Zela Ruiz, Cecília M. Rubira -
Runtime Verification for Biochemical Programs
Abstract The biochemical paradigm is well-suited for modelling autonomous systems and new programming languages are emerging from this approach. However, in order to validate such programs, we need to define precisely their semantics and to provide...
2013 / Oana Andrei, Hélène Kirchner -
Chu Spaces, Concept Lattices, and Domains
Abstract This paper serves to bring three independent but important areas of computer science to a common meeting point: Formal Concept Analysis (FCA), Chu Spaces, and Domain Theory (DT). Each area is given a perspective or reformulation that is...
2014 / Guo-Qiang Zhang -
A unified classification model for modeling of seismic liquefaction potential of soil based on CPT
Abstract The evaluation of liquefaction potential of soil due to an earthquake is an important step in geosciences. This article examines the capability of Minimax Probability Machine (MPM) for the prediction of seismic liquefaction potential of...
2014 / Pijush Samui, R. Hariharan -
Disassembly Liaison Graphs Inspired by Word Clouds
Abstract Liaison or connection graphs depict physical mates between components in a graphical representation but do not incorporate any precedence relations or order of assembly or disassembly of components. For the context of disassembly, we...
2013 / Robert J. Riggs, S. Jack Hu -
Predicting Malay Prominent Syllable Using Support Vector Machine
Abstract The prediction of prominent syllable using Support Vector Machines (SVMs) is proposed in this paper. As much as 50 sentences out of 400 sentences from Malay syntax-prosody speech text has been selected as training and testing data set. SVM...
2014 / Nur ‘Athifah Arifin, Sabrina Tiun -
Compositional probabilistic verification through multi-objective model checking
Abstract Compositional approaches to verification offer a powerful means to address the challenge of scalability. In this paper, we develop techniques for compositional verification of probabilistic systems based on the assume-guarantee paradigm. We ...
2013 / Marta Kwiatkowska, Gethin Norman, David Parker, Hongyang Qu -
Closed or open innovation? Problem solving and the governance choice
Abstract Scholars have recently highlighted the promise of open innovation. In this paper, we treat open innovation—in it's different forms and manifestations—as well as internal or closed innovation, as unique governance forms with different...
2013 / Teppo Felin, Todd R. Zenger -
Court-circuit gastrique totalement robotique (avec vidéo)2014 / G. Fantola, N. Reibel, A. Germain, A. Ayav, L. Bresler, et al.
-
On Performance Analysis of IASEN–3 in Faulty and Non–faulty Network Conditions
Abstract This paper presents a new fault sustainable interconnection network (IN) called as Irregular Augmented Shuffle Exchange Network–3 (IASEN–3) and its routing algorithm. The Performance of IASEN–3 has been evaluated and compared with existing...
2013 / Ved Prakash Bhardwaj, Nitin -
Comparison of eigensolvers for symmetric band matrices
Abstract We compare different algorithms for computing eigenvalues and eigenvectors of a symmetric band matrix across a wide range of synthetic test problems. Of particular interest is a comparison of state-of-the-art tridiagonalization-based...
2014 / Michael Moldaschl, Wilfried N. Gansterer -
Analysis of Viewer EEG Data to Determine Categorization of Short Video Clip
Abstract This paper discusses some very early research results for a Machine Learning System using Brain-Machine Interface data to categorize whether a viewer likes a short video. Prior art teaches that Machine Learning can be used to categorize...
2012 / Paul A. Nussbaum, Alfred Herrera, Rounak Joshi, Rosalyn Hargraves -
Bark-wavelet Analysis and Hilbert–Huang Transform for Underwater Target Recognition
Abstract Recognizing the underwater targets by the radiated noise information is one of the most significant subjects in the area of underwater acoustics. A novel recognition approach which consists of the algorithms of Bark-wavelet analysis,...
2013 / Xiang-yang Zeng, Shu-guang Wang -
Skew-insensitive Parallel Algorithms for Relational Join
Abstract Join is the most important and expensive operation in relational databases. The parallel join operation is very sensitive to the presence of the data skew. In this paper, we present two new parallel join algorithms for coarse-grained...
2013 / Khaled AlSabti, Sanjay Ranka -
Effectiveness of Early Evaluation Test as a Method for Identification of Problematic Students
Abstract The decline in university students’ performance has become an issue of great concern to university educators. An early detection of problematic students can help the educators to monitor and improve the student performance. Previously, we...
2013 / Noorfazila Kamal, Norhana Arsad, Hafizah Husain, Afida Ayob