Computer and information sciences topic list of research papers
-
Object-Oriented Specifications of Distributed Systems in the μ-Calculus and Maude
Abstract We refine an abstract property-oriented specification in the μ-calculus to a specification in Maude. As an intermediate step, we use a structured specification in the μ-calculus blended with propositions on states appropriate for...
2004 / Ulrike Lechner -
A Representation of Fω in LF
Abstract We study how the type theory Fω can be adequately represented in the meta-logical framework Twelf [16]. This development puts special emphasis on the way how terms, types, and kinds are represented in that it uses...
2004 / Carsten Schürmann, Dachuan Yu, Zhaozhong Ni -
A fully abstract semantics for a nondeterministic functional language with monadic types
Abstract This paper presents a functional programming language, based on Moggi's monadic metalanguage. In the first part of this paper, we show how the language can be regarded as a monad on a category of signatures, and that the resulting category...
2004 / Alan Jeffrey -
The forensic imaging techniques of portable X-ray units used in render safe operations of improvised explosive devices (IEDs)
Abstract In this study, it was aimed to get a proper image of the components, (battery, cable, firing mechanism, main charge etc.) of a 48×35×11cm simulated improvised explosive device (IED) placed into a suitcase, using appropriate X-ray beam...
2013 / Ercan Seyhan -
Hybrid of Rule-based Systems Using Genetic Algorithm to Improve Platform Game Performance
Abstract Several attempts in the field for various games have been made using Genetic Algorithm. “Geometry Friends” is one of many platform games. This paper shows performance improvement of the platform game by applying GA. We attempt to determine...
2013 / Hyun-Tae Kim, Kyung-Joong Kim -
Use of both Invisible and Emergable Watermarks to Deter Illegal Copying of Images
Abstract Emergable watermarks become visible in content that has been copied under designated conditions so that their use should deter illegal copying. However, the message presented by an emerged watermark is easily removed from the copied content ...
2013 / Takaaki Yamada -
Data Management with Flexible and Extensible Data Schema in CLANS
Abstract Data Management plays an essential role in both research and industrial areas, especially for the fields need text processing, like business domain. Corporate Leaders Analytics and Network System (CLANS) is a system designed to identify and ...
2013 / Shuai Wang, Yuanyuan Man, Tianyu Zhang, T.J. Wong, Irwin King -
Generating custom propagators for arbitrary constraints
Abstract Constraint Programming (CP) is a proven set of techniques for solving complex combinatorial problems from a range of disciplines. The problem is specified as a set of decision variables (with finite domains) and constraints linking the...
2014 / Ian P. Gent, Christopher Jefferson, Steve Linton, Ian Miguel, Peter Nightingale -
QoS of MANet Through Trust based AODV Routing Protocol by Exclusion of Black Hole Attack
Abstract Black hole attack is a common security issue encountered in Mobile Adhoc Network (MANet) routing protocol. In this paper a trust value for each node has been obtained depending upon the packet forwarding ability of the node. A rank is...
2014 / Radha Krishna Bar, Jyotsna Kumar Mandal, Moirangthem Marjit Singh -
A Connectionist Model for Acquisition of Syntactic Islands
Abstract This paper addresses learning biases for language acquisition in a computational modeling approach for the task of learning complex syntactic phenomena. Children have learning biases for acquisition of their language. Many generative...
2013 / Yu Tomida, Akira Utsumi -
Methods for Using Intrusion Logs to Establish Criminal Evidence Against Intruders
Abstract The admissible rate of criminal evidence against intruders has continued to generate classical arguments because the reports extracted from intrusion lo gs are often disputed in many courts of law. Besides, forensic experts still spend...
2013 / Nehinbe Joshua ojo, Nehibe Johnson Ige -
Web Service Integration within Next Generation CEMIS
Abstract This paper presents an implementation of the Corporate Environmental Management Information Systems (CEMIS) Next Generation platform (the core component) from the IT-for-Green research project. Key personnel from the research and transfer...
2014 / Tariq Mahmoud, Barbara Rapp, Sebastian van Vliet -
The Effectiveness of Computer-assisted Language Learning (CALL) on Learning Grammar by Iranian EFL Learners
Abstract Despite the enormous potential of computer assisted language learning (CALL) in teaching and learning foreign language, no serious action has been taken to develop this phase of education at schools and universities in Iran. A group of 52...
2014 / Parvin Pirasteh -
Explicit Instruction of Context-embedded Hyperlinked Thematic Words and Vocabulary Recall
Abstract This follow-up study examined the effect of some strategies on vocabulary recall of 75 Iranian intermediate learners through PowerPoint. Three groups were in the study. Seventy new hyperlinked thematically-related words were explicitly...
2014 / Hassan Soleimani, Maryam Molla Esmaeili -
Wireless BAN on a Bipedal Robot
Abstract This paper describes a wireless approach to “wiring” a bipedal robot. The use of a body area network (BAN) based on RF technology saves substantial weight and prevents failures due to broken cables near moving parts. Despite using wireless...
2013 / Lars Widmer, Dennis Majoe, Jürg Gutknecht -
Korean Engineering Majors’ Perspective Toward Lifelong Learning Using Latent Class Analysis
Abstract In this article the following three research questions were addressed: Firstly, Are there underlying types of motivation to lifelong learning? Secondly, are sex and learning skill are predictive of membership in types of motive toward...
2014 / Choi Jaewoo, Kang Woonsun -
SARP: Synchronous Adaptive Routing Protocol for MANETs
Abstract The aim of a routing protocol is to compute valid routes allowing every couple of nodes in the network to communicate at anytime. When the network topology is evolving over time, routing decisions should be constantly reconsidered. The main ...
2013 / Mohamed Amine Abida, Abdelfettah Belghitha, Khalil Drirab -
Flexible Unicast-Based Group Communication for CoAP-Enabled Devices2014 / Isam Ishaq, Jeroen Hoebeke, Floris Van den Abeele, Jen Rossey, Ingrid Moerman, et al.
-
OM2M: Extensible ETSI-compliant M2M Service Platform with Self-configuration Capability
Abstract Machine-to-Machine (M2M) concept is one of the main features of Internet of Things (IoT). It promises to inter-connect billions of devices in near future covering various domains. However, M2M suffers from a high vertical fragmentation of...
2014 / M. Ben Alaya, Y. Banouar, T. Monteil, C. Chassot, K. Drira -
Energy Efficient Strategy for Throughput Improvement in Wireless Sensor Networks2015 / Sohail Jabbar, Abid Minhas, Muhammad Imran, Shehzad Khalid, Kashif Saleem