Computer and information sciences topic list of research papers
-
Multipath QoS Routing for Traffic Splitting in MANETs
Abstract Mobile ad hoc networks (MANETs) are characterized by its dynamic topology which has limited channel bandwidth and limited power at the nodes. Because of these characteristics in the MANETs the paths connecting source nodes with destinations ...
2015 / Ch. Niranjan Kumar, N. Satyanarayana -
Automated construction of evolutionary algorithm operators for the bi-objective water distribution network design problem using a genetic programming based hyper-heuristic approach2014 / Kent McClymont, Edward C. Keedwell, Dragan Savić, Mark Randall-Smith
-
Elaboration of an implementation approach of a condition-based maintenance through vibration analysis2015 / El Mehdi Semma, Ahmed Mousrij, Hassan Gziri
-
Multi-Objective Tasks Scheduling Algorithm for Cloud Computing Throughput Optimization
Abstract In cloud computing datacentersexert server unification to enhance the efficiency of resources. Many Vms (virtual machine) are running on each datacenter to utilize the resources efficiently. Most of the time cloud resources are...
2015 / Atul Vikas Lakra, Dharmendra Kumar Yadav -
The Incompatibility of Pareto Optimality and Dominant-Strategy Incentive Compatibility in Sufficiently-Anonymous Budget-Constrained Quasilinear Settings2013 / Rica Gonen, Anat Lerner
-
On the detection of custom memory allocators in C binaries2015 / Xi Chen, Asia Slowinska, Herbert Bos
-
Techniques to Enhance the Quality of Service of Multi Hop Relay Networks
Abstract Broadband internet access through the user equipment has become the hot research topic. The shadowing and multipath issues restrict the high performance nature of 4G cells. In Multi hop Relay (MHR) networks, Relay Stations (RS) are...
2015 / M. Arthi, P. Arulmozhivarman, K. Vinoth Babu, G. Ramachandra Reddy, D. Barath -
Implementation of Pattern Matching Algorithm to Defend SQLIA
Abstract SQL Injection is a type of web application security vulnerability in which an attacker is able to submit a database SQL command which is executed by a web application, exposing the back-end database. SQL injection is one of the technique by ...
2015 / Nency Patel, Narendra Shekokar -
Knowledge Based Development in Automotive Industry Guided by Lean Enablers for System Engineering
Abstract The Systems Engineering literature acknowledges that the principles of Lean Product Development foster the achievement of higher program performance5. Work has been carried out to explore and capture synergies between traditional System...
2015 / Daniel Stenholm, Henrik Mathiesen, Dag Bergsjo -
Gentoo Linux: the next generation of Linux2004 / G.K. Thiruvathukal
-
Evolutionary Optimization of Production Materials Workflow Processes
Abstract We present an evolutionary optimisation technique for stochastic production processes, which is able to find improved production materials workflow processes with respect to arbitrary combinations of numerical quantities associated with the ...
2014 / Luke Herbert, Zaza Nadja Lee Hansen, Peter Jacobsen, Pedro Cunha -
Visualizing and Improving the Robustness of Phase Retrieval Algorithms
Abstract Coherent x-ray diffractive imaging is a novel imaging technique that utilizes phase retrieval and nonlinear optimization methods to image matter at nanometer scales. We explore how the convergence properties of a popular phase retrieval...
2015 / Ashish Tripathi, Sven Leyffer, Todd Munson, Stefan M. Wild -
Production Resource Search Using the Viral Phenomenon: Concept Introduction
Abstract A significant challenge in a distributed production organisation is finding suitable production resources. In this study, we develop the concept of a production resource search system that can be used to organise a distributed manufacturing ...
2014 / Gašper Škulj, Rok Vrabič, Peter Butala, Alojzij Sluga -
Low-Energy Symmetric Key Distribution in Wireless Sensor Networks2010 / K McCusker, N E O'Connor
-
An Algorithm for Guideline Transformation: From BPMN to SDA
Abstract The Business Process Modelling and Notation (BPMN) is a widely-accepted standard for process modelling, which can be used to model the clinical processes contained in guidelines. Computer systems based on guidelines need to embed these...
2015 / Begoña Martínez-Salvador, Mar Marcos, David Riaño -
An ontology-based approach to auto-tagging articles2014 / Gridaphat Sriharee
-
Adaptive image denoising using scale and space consistency2002 / J. Scharcanski, C.R. Jung, R.T. Clarke
-
Use of Social Networking Tools for Informal Scholarly Communication in Humanities and Social Sciences Disciplines
Abstract Social networking tools, reinforced by proliferation and advances in portable computing and wireless technologies, have reshaped how information is produced, communicated, and consumed. This research investigates the extent to which social...
2014 / Ali S. Al-Aufi, Crystal Fulton -
Evaluation of Prompted Annotation of Activity Data Recorded from a Smart Phone2014 / Ian Cleland, Manhyung Han, Chris Nugent, Hosung Lee, Sally McClean, et al.
-
Performance Analysis of Agent Based Framework
Abstract Cloud computing is the delivery of on-demand computing resources – everything from applications to datacenters over the internet on pay per use basis. Service composition in cloud is an important mechanism usually done through several...
2015 / K. Sindhuja, A.V. Monisha, S. Padmavathi