Computer and information sciences topic list of research papers
-
Scalar System F for Linear-Algebraic λ-Calculus: Towards a Quantum Physical Logic
Abstract The Linear-Algebraic λ-Calculus [Arrighi, P. and G. Dowek, Linear-algebraic λ-calculus: higher-order, encodings and confluence, Lecture Notes in Computer Science (RTA'08) 5117 (2008), pp. 17–31] extends the λ-calculus with the possibility...
2011 / Pablo Arrighi, Alejandro Díaz-Caro -
A–maze–ing Esterel2004 / Joaquin Aguado, Michael Mendler, Gerald Lüttgen
-
Toward Extracting π-calculus from UML Sequence and State Diagrams2004 / Katerina Pokozy-Korenblat, Corrado Priami
-
Analysing the Vulnerability of Protocols to Produce Known-pair and Chosen-text Attacks
Abstract In this paper we report on an analysis for finding known-pair and chosen-text attacks in protocols. As these attacks are at the level of blocks, we extend the attacker by special capabilities related to block chaining techniques. The...
2005 / Steve Kremer, Mark D. Ryan -
Automated Analysis of Reo Circuits using Symbolic Execution
Abstract Reo is a coordination language that can be used to model different systems. We propose a technique for symbolic execution of Reo circuits using Constraint Automata and more specifically exploiting their data constraints. This technique...
2009 / Bahman Pourvatan, Marjan Sirjani, Hossein Hojjat, Farhad Arbab -
Component Simulation-based Substitutivity Managing QoS Aspects
Abstract Several scientific bottlenecks have been identified in existing component-based approaches. Among them, we focus on the identification of a relevant abstraction for the component expression and verification of properties like...
2009 / Pierre-Cyrille Héam, Olga Kouchnarenko, Jérôme Voinot -
Dynamics for ML using Meta-Programming
Abstract We present the design and implementation of dynamic type and value introspection for the OCaml language. Unlike previous attempts, we do not modify the core compiler or type-checker, and instead use the camlp4 metaprogramming tool to...
2011 / Thomas Gazagnaire, Anil Madhavapeddy -
Modeling and Verifying Graph Transformations in Proof Assistants
Abstract This paper takes first steps towards a formalization of graph transformations in a general setting of interactive theorem provers, which will form the basis for proofs of correctness of graph transformation systems. Whereas graph rewriting...
2008 / Martin Strecker -
Intra-Object versus Inter-Object: Concurrency and Reasoning in Creol
Abstract In thread-based object-oriented languages, synchronous method calls usually provide the mechanism to transfer control from caller to callee, blocking the caller until the call is completed. This model of control flow is well-suited for...
2009 / Einar Broch Johnsen, Jasmin Christian Blanchette, Marcel Kyas, Olaf Owe -
Behind BANANA: Design and Implementation of a Tool for Nesting Analysis of Mobile Ambients2004 / C. Braghin, A. Cortesi, R. Focardi, F.L. Luccio, C. Piazza
-
Multimodal Separation Logic for Reasoning About Operational Semantics
Abstract We show how to reason, in the proof assistant Coq, about realistic programming languages using a combination of separation logic and heterogeneous multimodal logic. A heterogeneous multimodal logic is a logic with several modal operators...
2008 / Robert Dockins, Andrew W. Appel, Aquinas Hobor -
GLL Parsing
Abstract Recursive Descent (RD) parsers are popular because their control flow follows the structure of the grammar and hence they are easy to write and to debug. However, the class of grammars which admit RD parsers is very limited. Backtracking...
2010 / Elizabeth Scott, Adrian Johnstone -
Optimal strategies for maintaining a chain of relays between an explorer and a base camp
Abstract We envision a scenario with robots moving on a terrain represented by a plane. A mobile robot, called explorer is connected by a communication chain to a stationary base camp. The chain is expected to pass communication messages between the ...
2008 / Jarosław Kutyłowski, Friedhelm Meyer auf der Heide -
A New Class of Priority-based Weighted Fair Scheduling Algorithm
Abstract The traditional fair queuing scheduling algorithm (WFQ WF2Q) for data application is a fair and efficient algorithm, while when they face to real-time applications such as voice, interactive video, and so on, they are short of the guarantee ...
2012 / Li Yang, ChengSheng Pan, ErHan Zhang, HaiYan Liu -
Performance Evaluation of A Infiniband-based Lustre Parallel File System
Abstract As one of the most widely used parallel file systems, Lustre plays an important role in High Performance Computing (HPC). In this paper, an infiniband-based Lustre parallel file system is built firstly. And then a series of experiments are...
2012 / Yuan Wang, Yongquan Lu, Chu Qiu, Pengdong Gao, Jintao Wang -
Empirical Comparison of Sampling Strategies for Classification
Abstract Data sets contain very large amount of data which is not an easy task for the user to scan the entire data set. The researcher's initial task is to formulate a rational justification for the use of sampling in his research. Sampling has...
2012 / Kaberi Das, Prem Pujari Pati, Debahuti Mishra, Lipismita Panigrahi -
Intelligent System for Human Computer Interface Using Hand Gesture Recognition
Abstract In early days computers are operated by various interface devices, which are developed by the humans to interact with computers. Starting from Punch-cards to touch screens man has changed the human life into an unimaginable state. In this...
2012 / R. Elakkiya, K. Selvamani, S. Kanimozhi, Rao. Velumadhava, A. Kannan -
A Survey on Single Sign-On Techniques
Abstract Single sign-on (SSO) is a mechanism that uses a single action of authentication to permit an authorized user to access all related, but independent software systems or applications without being prompted to log in again at each of them...
2012 / V. Radha, D. Hitha Reddy -
ProActive Approach for Generating Random Passwords for Information Protection
Abstract Text based passwords are the most widely used authentication mechanism in multiuser environment. Creating strong password is often a difficult task for users. Multiuser environments employ some password composition policy for users, which...
2012 / Abhishek Bafna, Sandeep Kumar -
Isolated Word Command Recognition for Robot Navigation
Abstract This project is demonstrating Robot Navigation Control using Isolated Word Recognition. Five spoken word commands (Go, Stop, Left, Right and Back) should be record and used as commands. Fast Fourier Transform (FFT) is used to filter the...
2012 / Hooman Heidari, Suresh Gobee