Computer and information sciences topic list of research papers
-
Static Equivalence is Harder than Knowledge
Abstract There are two main ways of defining secrecy of cryptographic protocols. The first version checks if the adversary can learn the value of a secret parameter. In the second version, one checks if the adversary can notice any difference...
2006 / Johannes Borgström -
A Rule-based Method to Match Software Patterns Against UML Models
Abstract In a UML model, different aspects of a system are covered by different types of diagrams and this bears the risk that an overall system specification becomes barely tractable by the designer. When the model grows, it is likely that the...
2008 / D. Ballis, A. Baruzzo, M. Comini -
Mathematical, Interactive Exercise Generation from Static Documents
Abstract We present an exercise description language suitable for the representation of interactive exercises which involve mathematical entities, and have complex structures. One of the goals of the language is to provide primitives for support of...
2004 / Manolis Mavrikis, Alberto González Palomo -
Preface2004 / Brian Barry, Oege de Moor
-
Maude as a Platform for Designing and Implementing Deep Inference Systems
Abstract Deep inference is a proof theoretical methodology that generalizes the traditional notion of inference in the sequent calculus: in contrast to the sequent calculus, the deductive systems with deep inference do not rely on the notion of main ...
2008 / Ozan Kahramanoğulları -
Relative Randomness and Real Closed Fields
Abstract We show that for any real number, the class of real numbers less random than it, in the sense of rK-reducibility, forms a countable real closed subfield of the real ordered field. This generalizes the well-known fact that the computable...
2005 / Alexander Raichev -
Verifying Multithreaded Recursive Programs with Integer Variables
Abstract We consider the verification problem of programs containing the following complex features: (1) dynamic creation of parallel threads, (2) synchronisation between parallel threads via global variables, (3) (possibly recursive) procedure...
2009 / Narjes Ben Rajeb, Brahim Nasraoui, Riadh Robbana, Tayssir Touili -
Heuristics for Faster Error Detection With Automated Black Box Testing
Abstract Three building blocks for test guidance algorithms, the step evaluation, the state evaluation and the evaluation order, are proposed in this paper. We show how a simple family of coverage criteria can be used to evaluate individual testing...
2005 / Antti Kervinen, Pablo Virolainen -
Extracting Program Logics From Abstract Interpretations Defined by Logical Relations
Abstract We connect the activity of defining an abstract-interpretation-based static analysis with synthesizing its appropriate programming logic by applying logical relations as demonstrated by Abramsky. We begin with approximation relations of...
2007 / David A. Schmidt -
Verified Compilation and the B Method: A Proposal and a First Appraisal
Abstract This paper investigates the application of the B method beyond the classical algorithmic level provided by the B0 sub-language, and presents refinements of B models at a level of precision equivalent to assembly language. We claim and...
2009 / Bartira Dantas, David Déharbe, Stephenson Galvão, Anamaria Martins Moreira, Valério Medeiros -
Image Encryption using Elliptic Curve Cryptography
Abstract Million of images are transferred everyday across the network. Some of these images are confidential and we want these images to be transferred securely. Cryptography plays a significant role in transferring images securely. The...
2015 / Laiphrakpam Dolendro Singh, Khumanthem Manglem Singh -
Study on Privacy Protection Algorithm Based on K-Anonymity
Abstract Basing on the study of K-Anonymity algorithm in privacy protection issue, this paper proposed a “Degree Priority” method of visiting Lattice nodes on the generalization tree to improve the performance of K-Anonymity algorithm. This paper...
2012 / Zhao FeiFei, Dong LiFeng, Wang Kun, Li Yang -
Modeling Passive Propagation of Malwares on the WWW
Abstract Web-based malwares host in websites fixedly and download onto user's computers automatically while users browse. This passive propagation pattern is different from that of traditional viruses and worms. A propagation model based on reverse...
2012 / Liu Chunbo, Jia Chunfu -
Joint MAC-PHY Layer Resource Allocation Algorithm Based on Triangle Module Operator for Multi-Service OFDM System
Abstract The algorithms of the PHY layer may lead to the data loss and the waste of resource for multi-service OFDM system. In order to resole this problem, a joint MAC-PHY layer resource allocation algorithm is proposed in this paper. The service...
2011 / Sun Yi, Yu Li, Zhang Jing, Tang Liang-rui -
Web-Based Collaborative Learning
Abstract The development of information technology, especially the rapid development of multimedia technology and the network technology, provide better development for collaborative learning. Compared to traditional collaborative learning,...
2012 / Fan Qing, Lin Li -
An Approximate Algorithm to Solve the Location-Selection of Recycle Water Station Problem
Abstract The minimum Steiner tree problem has wide application background, such as transportation system, communication network, pipeline design and VISL, etc. It is unfortunately that the computational complexity of the problem is NP-hard. People...
2011 / Qing-bin Li Jin-tao Meng, Xiao-xu Lu -
Epidemic Spreading Over Social Networks Using Large-scale Biosensors: A Survey
Abstract Recent technological developments on mobile technologies allied with the growing computational capabilities of sensing enabled devices have given rise to mobile sensing systems that can target community level problems. These systems are...
2012 / João Andrade, Artur Arsenio -
Inter Carrier Interference Analysis of SCFDMA System using Frequency Domain Equalization
Abstract Single Carrier Frequency Division Multiple Access (SCFDMA) system performs better than multicarrier transmission systems due to its inherent single carrier structure. It is a strong candidate for uplink communication due to its lower peak...
2012 / Alka Kalra, Rajesh Khanna, Charu Garg -
PAPR Reduction Scheme for OFDM
Abstract This paper focused on peak to average power ratio (PAPR) reduction scheme for OFDM system. OFDM has several properties which make it an attractive modulation scheme for high speed transmission. the main draw back of OFDM is high PAPR. The...
2012 / Sandeep Bhad, Pankaj Gulhane, A.S. Hiwale -
Incremental Indexing for High-Dimensional Data using Tree Structure
Abstract A suitable indexing scheme for multimedia information retrieval is the need of the hour and captured the attention of researchers. In content-based image retrieval applications, users wait for long query time to retrieve similar images from ...
2012 / R Vishnu Priya, A. Vadivel