Computer and information sciences topic list of research papers
-
The self-taught vocal interface2014 / Bart Ons, Jort F Gemmeke, Hugo hamme
-
On the complexity-performance trade-off in soft-decision decoding for unequal error protection block codes2013 / Rebecca C de Albuquerque, Daniel C Cunha, Cecilio Pimentel
-
Design of Automatic Question Answering System Base on CBR
Abstract Against the lack of existing answering system in terms of intelligence and human-computer interaction, on the basis of the CBR, proposed a design of intelligent question answering system, and study the key technologies of this program,...
2012 / Liang Zhenqiu -
A TMS320C6416 DSP Real Time Implementation of Continuous Wavelet Filtering Module
Abstract This paper expounds the real time realization cochlear strategy based on wavelet transform (WT). This electrical stimulation of the brain is the explanation of voice. Electrical stimulation to real-time optimization strategy, has taken...
2011 / Yu Hai-chun -
Design of Humidity Monitoring System Based on Virtual Instrument
Abstract In order to overcome disadvantages of the single-chip based humidity test system, a humidity monitoring system was designed using virtual instrument technology. The system consists of data acquisition module, signal process and display...
2011 / Jianwei Li, Hong Zhou, Huiqin Li, Yan Li -
Distance measure for linguistic decision making
Abstract In this paper, we extend the distance measure to the linguistic fuzzy sets, and develop the linguistic distance operators, such as linguistic weighted distance (LWD) operator, linguistic ordered weighted distance (LOWD) operator, and study...
2011 / Yejun Xu, Huimin Wang -
A Combination of Shuffled Frog Leaping and Fuzzy Logic for Flexible Job-Shop Scheduling Problems
Abstract Flexible Job-Shop Scheduling Problem (FJSP) is a well known NP-hard combinatorial optimization problem. Over the last decade, many algorithms have been proposed to tackle FJSP. Evolutionary algorithms, which solve problems by mimicking the...
2011 / Wannaporn Teekeng, Arit Thammano -
A New Data Randomization Method to Defend Buffer Overflow Attacks
Abstract Code injection attack has become a typical representative of the attacks against memory, buffer overflow attacks which is the most commonly used. It relies on the change of control-flow, let the program point to the malicious code in order...
2012 / Yan Fen, Yuan Fuchao, Shen Xiaobing, Yin Xinchun, Mao Bing -
Recommending the Meanings of Newly Coined Words
Abstract In this paper, we investigate how to recommend the meanings of newly coined words, such as newly coined named entities and Internet jargon. Our approach automatically chooses a document explaining a given newly coined word among candidate...
2011 / Jong Gun Lee, Young-Min Kim, Jungyeul Park, Jeong-Won Cha -
A Multi-Agent approach To the Design of An Programming ICAI System
Abstract Programming ICAI covers the whole range of teaching and learning of programming, multi-agent approach is suitable for the development of ICAI program. In this paper,Firstly the design goal and ideas are described for the Programming...
2012 / Zheng Xing Xiao -
Research on Chord Searching Algorithm Base on Cache Strategy
Abstract How to improve search efficiency is a core problem in P2P network, Chord is a successful searching algorithm, but its lookup efficiency is lower because finger table has redundant information proposed the recently visited table and improved ...
2012 / Guo Jun, Chen Chen -
Developing Product Lines with Third-Party Components
Abstract The trends toward product line development and toward adopting more third-party software are hard to combine. The reason is that product lines demand fine control over the software (e.g., for diversity management), while third-party...
2009 / Merijn de Jonge -
Map Theory: From Well-Foundation to Antifoundation2004 / Thierry Vallée
-
Modelling Parallel Quantum Computing Using Transactional Memory
Abstract We propose a model for parallel quantum computing in a single ensemble quantum computer using Haskell's software transaction memory. The parallel ensemble quantum computer possesses, besides quantum parallelism, a kind of classical...
2011 / Juliana Kaizer Vizzotto, André Rauber Du Bois -
Monotonic Abstraction in Parameterized Verification
Abstract We present a tutorial on verification of safety properties for parameterized systems. Such a system consists of an arbitrary number of processes which are organized in a linear array. The aim is to prove correctness of the system regardless ...
2008 / Parosh Aziz Abdulla, Giorgio Delzanno, Ahmed Rezine -
Extending Lustre with Timeout Automata
Abstract This paper describes an extension to Lustre to support the analysis of globally asynchronous, locally synchronous (GALS) architectures. This extension consists of constructs for directly specifying the timeout automata used to describe...
2008 / Jimin Gao, Mike Whalen, Eric Van Wyk -
Automated Game Analysis via Probabilistic Model Checking: a case study
Abstract It has been recognised for some time that there are close links between the various logics developed for the analysis of multi-agent systems and the many game-theoretic models developed for the same purpose. In this paper, we contribute to...
2006 / P. Ballarini, M. Fisher, M.J. Wooldridge -
On the Specification of Full Contracts
Abstract Contracts specify properties of an interface to a software component. We consider the problem of defining a full contract that specifies not only the normal behaviour, but also special cases and tolerated exceptions. In this paper we focus...
2009 / Stephen Fenech, Gordon J. Pace, Joseph C. Okika, Anders P. Ravn, Gerardo Schneider -
Mumbo: A Rule-Based Implementation of a Run-time Program Generation Language
Abstract We describe our efforts to use rule-based programming to produce a model of Jumbo, a run-time program generation (RTPG) system for Java. Jumbo incorporates RTPG following the simple principle that the regular compiler — or, rather, its...
2006 / Barış Aktemur, Sam Kamin -
Testing Against Some Eventuality Properties of Synchronous Software: A Case Study2004 / L. du Bousquet, F. Ouabdesselam, J.-L. Richier, N. Zuanon