Computer and information sciences topic list of research papers
-
A Syntactic Criterion for Injectivity of Authentication Protocols
Abstract Injectivity is essential when studying the correctness of authentication protocols, because noninjective protocols may suffer from replay attacks. The standard ways of verifying injectivity either make use of a counting argument, which only ...
2005 / C.J.F. Cremers, S. Mauw, E.P. de Vink -
Compiling the π-calculus into a Multithreaded Typed Assembly Language
Abstract We extend a previous work on a multithreaded typed assembly language (MIL) targeted at shared memory multiprocessors, and describe the design of a type-preserving compiler from the π-calculus into MIL. The language enforces a policy on lock ...
2009 / Tiago Cogumbreiro, Francisco Martins, Vasco T. Vasconcelos -
Translating Stochastic CLS into Maude
Abstract This paper describes preliminary results on the application of statistical model-checking to systems described with Stochastic CLS. Stochastic CLS is a formalism based on term rewriting that allows biomolecular systems to be described by...
2009 / Thomas Anung Basuki, Antonio Cerone, Paolo Milazzo -
Adding Mobility to Software Architectures
Abstract Mobility has become a new factor of complexity in the construction and evolution of software systems. In this paper, we show how architectural description techniques can be enriched to support the incremental and compositional construction...
2004 / Antónia Lopes, José Luiz Fiadeiro -
Symmetric and Asymmetric Asynchronous Interaction
Abstract We investigate classes of systems based on different interaction patterns with the aim of achieving distributability. As our system model we use Petri nets. In Petri nets, an inherent concept of simultaneity is built in, since when a...
2009 / Rob van Glabbeek, Ursula Goltz, Jens-Wolfhard Schicke -
The tccp Interpreter
Abstract The Timed Concurrent Constraint language (tccp in short) is a declarative language inspired by some formalisms specially developed to deal with concurrent and reactive systems. It is defined as a timed extension of the Saraswat's Concurrent ...
2009 / Alexei Lescaylle, Alicia Villanueva -
Non-uniform Concentric Circular Antenna Array Design using IPSO Technique for Side Lobe Reduction
Abstract In this paper the optimal design for maximum sidelobe level (SLL) reduction of three-ring Concentric Circular Antenna Array (CCAA) is determined using a novel Particle Swarm Optimization (PSO) technique namely Improved Particle Swarm...
2012 / Durbadal Mandal, Md. Asif Iqbal Ansari, Rajib Kar, S.P. Ghoshal -
Multi-agent Systems for HL7 Interoperability Services
Abstract Information systems in healthcare are complex abstract systems. Systems communicate in a consolidated manner. Several methodologies exist presently to implement interoperable information systems in healthcare. It results in several common...
2012 / Miguel Miranda, Maria Salazar, Filipe Portela, Manuel Santos, António Abelha, et al. -
The age of the virtual trainer
Abstract Much of the developed world is currently affected by an overweight epidemic. A large population of people are undertaking a personal fitness regime in order to improve fitness, lose or maintain weight or for general health reasons....
2012 / Shane Lowe, Gearóid ÓLaighin -
Radial Basis Function Controller of a Class of Nonlinear Systems Using Mamdani Type as a Fuzzy Estimator
Abstract In this work we consider the application of an adaptive neural network control for a class of single input single output non linear systems. The method uses a neural network system of Radial Basis Function (RBF) type to approximate the...
2012 / M. Bahita, K. Belarbi -
Predictive Queue-based Technique for Network Latency Optimization in Established TCP/IP Gigabit Ethernet Stations
Abstract TCP/IP inefficiencies, coupled with the effects of WLAN latency and loss of packets can adversely affect application performance. These defects increase the response time of applications and significantly degrade the bandwidth efficiency....
2012 / Moses Ekpenyong, Chimaeme Igbokwe -
User Profile Tracking by Web Usage Mining in Cloud Computing
Abstract Service oriented domain like cloud computing, composite service selection is hard to accomplish in an effective manner. The high scalability of distributed systems, and large transaction of data bases, it is a vital important to categorizes ...
2012 / Joan M. John, G. Venifa Mini, E. Arun -
Implementation and Simulation of Content Distribution Strategy in P2P VOD System
Abstract This paper first analyzed the content distribution technology in P2P video-on-demand system, then compared the characteristics of different distribution strategies, and proposed a multi-source multi-path algorithm for content distribution,...
2011 / Jing Zhang -
Research on Evaluation of the MANET System Survivability
Abstract Through the limitations of current evaluation about the MANET system survivability, a quantitative evaluation method based on grey relation analysis is proposed. First, the typical grey relation analysis method has been improved and the...
2011 / Wang Ji lu, Yu Zhen wei -
Genetic Algorithm Based Congestion Aware Routing Protocol (GA-CARP) for Mobile Ad Hoc Networks
Abstract This paper represents a genetic algorithmic approach to the congestion aware routing problem in Mobile Ad hoc Networks. Variable-length chromosomes (strings) and their genes (parameters) are the sources for encoding the problem. The...
2012 / S. Santhosh Baboo, B. Narasimhan -
An Optimized Energy Consumption Algorithm for Manet
Abstract Power-optimization is an essential issue for all types of mobile hosts in the network. This paper proposes a new approach for optimizing power consumption in mobile ad hoc networks (MANETs) that consents to maximum life time of mobile hosts ...
2012 / S. Suganya, S. Palaniammal -
A Machine Learning Technique for Semantic Search Engine
Abstract In this world of information technology revolution we human wants a way of automation in every field, but the intelligent technique behind the way how we visualize an information is not equivalent to how an computer system visualize .In web ...
2012 / G. Nagarajan, K.K. Thyagharajan -
Efficient Reduction Techniques for Systems with Many Components
Abstract We present an improved approach to verifying systems involving many copies of a few kinds of components. Replication of this type occurs frequently in practice and is regarded a major source of state explosion during temporal logic model...
2005 / E. Allen Emerson, Thomas Wahl -
On Epistemic Temporal Strategic Logic
Abstract ATEL is one of the most expressive logics for reasoning about knowledge, time and strategies. Several issues around the interpretation of this logic are still unresolved. This paper contributes to the ongoing discussion by showing that...
2005 / Sieuwert van Otterloo, Geert Jonker -
Model Based Testing in Practice at Microsoft
Abstract As part of Microsofts Trustworthy Computing [Trustworthy Computing : Reliability URL http://www.microsoft.com/mscorp/twc/reliability/default.mspx] initiative the company has sought many ways to increase reliability. One approach being...
2005 / Keith Stobie