Computer and information sciences topic list of research papers
-
Context-Sensitive Visibility
Abstract An improvement to the so-called visual verification approach is presented. Visual verification is a method for checking the correctness of the behaviour of a reactive or concurrent system. It shares a great deal of common ground with...
2004 / Antti Valmari, Heikki Virtanen, Antti Puhakka -
Multi-Phase Meta-Heuristic for Multi-Depots Vehicle Routing Problem2013 / Muhammad Sarfraz, Malik Z. Hussain, Munazah Ishaq
-
Definability, Canonical Models, Compactness for Finitary Coalgebraic Modal Logic
Abstract This paper studies coalgebras from the perspective of the finitary observations that can be made of their behaviours. Based on the terminal sequence, notions of finitary behaviours and finitary predicates are introduced. A category Behω(T)...
2004 / Alexander Kurz, Dirk Pattinson -
Component-Based Applications
Abstract This paper presents a mechanism for dynamic reconfiguration of component-based applications and its fault tolerance strategy. The mechanism, named generic connector, allows composing a component-based application as a set of services with...
2004 / Thais Vasconcelos Batista, Milano Gadelha Carvalho -
Call-by-name, Call-by-value, Call-by-need, and the Linear Lambda Calculus
Abstract Girard described two translations of intuitionistic logic into linear logic, one where A → B maps to (!A) –○ B, and another where it maps to !(A –○ B). We detail the action of these translations on terms, and show that the first corresponds ...
2004 / John Maraist, Martin Odersky, David N. Turner, Philip Wadler -
A Call Abstraction for Component Coordination
Abstract DFC is a component architecture for telecommunication services. Although the call protocol through which DFC components interact is intrinsically simple, using it to program useful components is quite complex. We diagnose the problems and...
2004 / Pamela Zave, Michael Jackson -
A Tool for Abstraction in Model Checking
Abstract Abstraction methods have become one of the most interesting topics in the automatic verification of software systems because they can reduce the state space to be explored and allow model checking of more complex systems. Nevertheless,...
2004 / María del Mar Gallardo, Jesús Martínez, Pedro Merino, Ernesto Pimentel -
A Category-Theoretic Approach to Social Network Analysis
Abstract In this paper we introduce a category-theoretic formalisation of social network analysis. This generalises traditional graph-theoretic formalisations and facilitates a formal approach to statements and beliefs about social networks. We...
2004 / Anthony H. Dekker -
Towards ANSI C Program Slicing using XML
Abstract In this paper, we consider ANSI C program slicing using XML (Extensible Markup Language). Our goal is to build a flexible, useful and uniform data interchange format for CASE tools, which is a key issue to make it much easier to develop...
2004 / Katsuhiko Gondow, Hayato Kawashima -
Proving Termination by Policy Iteration
Abstract In this paper, we explore the adaptation of policy iteration techniques to compute greatest fixpoint approximations, in order to find sufficient conditions for program termination. Restricting ourselves to affine programs and the abstract...
2012 / Damien Massé -
From computer ethics to responsible research and innovation in ICT
Abstract The discourse concerning computer ethics qualifies as a reference discourse for ethics-related IS research. Theories, topics and approaches of computer ethics are reflected in IS. The paper argues that there is currently a broader...
2014 / Bernd Carsten Stahl, Grace Eden, Marina Jirotka, Mark Coeckelbergh -
Skew Correction of Textural Documents
Abstract Two algorithms for accurate skew detection and correction of textual documents are presented. They depend on finding a horizontal RLSA image of the skewed document. The average skew of selected black connected components in the RLSA image...
2013 / Ibrahim S.I. Abuhaiba -
Fast Polling Mechanism for Baseline BAN MAC (802.15.6) of Body Area Networks
Abstract Polling is a widely used generic Media Access Control (MAC) scheme in Wireless Sensor Networks. In this paper, we proposed a new mechanism that improves the performance of the existing polling mechanism of a recent defined MAC protocol,...
2013 / Zirui Lu, Zahoor Khan, Muhammad A Iqbal -
User-oriented RT Service Proposal System in Kukanchi
Abstract In this research, we develop user-oriented RT service proposal system in Kukanchi. Kukanchi is interactive Human-Space Design and Intelligence. By carrying out data mining of user information, service history, sensor data, and object data,...
2013 / Anna Ohira, Ngo Trung Lam, Makoto Mizukawa, Yoshinobu Ando, Takashi Yoshimi -
Contextual Equivalence for Higher-Order π-Calculus Revisited
Abstract The higher-order π-calculus is an extension of the π-calculus to allow communication of abstractions of processes rather than names alone. It has been studied intensively by Sangiorgi in his thesis where a characterisation of a contextual...
2014 / Alan Jeffrey, Julian Rathke -
Cry-based infant pathology classification using GMMs
Abstract Traditional studies of infant cry signals focus more on non-pathology-based classification of infants. In this paper, we introduce a noninvasive health care system that performs acoustic analysis of unclean noisy infant cry signals to...
2015 / Hesam Farsaie Alaie, Lina Abou-Abbas, Chakib Tadj -
A Method to Share Word Knowledge of Dependability Case
Abstract System developers should explain system errors sufficiently, during a system failure situation. This is an essential act in order to verify the dependability of systems. Dependability Case (D-Case) is one method for confirming systems of...
2013 / Masanori Matsumura, Vaise Patu, Yutaka Matsuno, Syota Takama, Tatsuya Tokuno, et al. -
Critical Event based Multichannel Process Control Monitoring Using WSN for Industrial Applications
Abstract Industries have lots of benefit by integrating sensors in industrial plants for continuous sensing and monitoring the status of the system. This paper discusses the efficient process monitoring of pipelines that carry oil, gas, water, and...
2013 / K. Arthi, A. Vijayalakshmi, P. Vanaja Ranjan -
An Intelligent Document Clustering Approach to Detect Crime Patterns
Abstract A wide number of reports and news on crimes, increasingly conducted almost every day, have resulted in making detection of such crimes more difficult if not complex. Therefore, the need for detecting and identifying such crimes emerges as a ...
2014 / Qusay Bsoul, Juhana Salim, Lailatul Qadri Zakaria -
Detecting Malicious URLs in E-mail – An Implementation
Abstract The World Wide Web has become the most essential criterion for information communication and knowledge dissemination. It helps to transact information timely, rapidly and easily. Identity theft and identity fraud are referred as two sides...
2013 / Dhanalakshmi Ranganayakulu, Chellappan C.