Computer and information sciences topic list of research papers
-
Remarks on pupils’ feedback concerning the implementation of virtual experiments in Science teaching
Abstract The huge steps of ICT development in the last decades proved that ICT tools provide many advantages in Science teaching by using not only traditional methods but also modern pedagogical approaches. One of the new technologies that can be...
2011 / Laura Monica Gorghiu, Gabriel Gorghiu, Crinela Dumitrescu, Radu Lucian Olteanu -
Integration of heuristics elements in the web-based environment: Experimental evaluation and usage analysis
Abstract The article deals with possibilities of using heuristics, interactivity and feedback in electronic learning materials. The aim of the paper is integration of heuristics elements in the web-based learning environment and the evaluation of...
2011 / Daša Klocoková -
Security Analysis of RFID based on Multiple Readers
Abstract RFID systems and equipments have many particularities and limitations which will bring a wide range of security issues, especially when the system contains a large number of tags and multiple readers, some of the traditional solutions are...
2011 / Bo Jin, Hongyu Jin -
Based on Cross-layer Adaptive Contention Window MAC Protocol for Middle and High Rate Sensor Networks
Abstract In middle and high rate sensor network (MHWSN) usually contains a large quantity of self-organizing distributed nodes. It can be widely applied in emergency searching, disaster salvation and military applications etc. As middle and high...
2011 / Jian-Fang Shen, Liang-Lun Cheng -
Detection of the Mobile Object with Camouflage Color Under Dynamic Background Based on Optical Flow
Abstract In order to realize the detection of the mobile object with camouflage color, a scheme based on optical flow model was put forward. Firstly, optical flow model was used to model the motion pattern of the object and the background. Secondly, ...
2011 / Jianqin Yin Yanbin Han Wendi Hou Jinping Li -
The Research And Application of Web Log Mining Based on the Platform Weka
Abstract Weka is a data mining platform based on Java with open source code, which gathers many machine learning algorithms to mine data, including data pretreatment, classification, cluster class, association rule mining and visual interactive...
2011 / Xiu-yu Zhong -
Sport safety improvement using security camera without audience privacy violation
Abstract Crime in the sport stadium is an unacceptable situation. It is necessary to watch and inform to the related person. The existed system to date is not replied such a requirement. In this paper, we propose the use of today information...
2010 / Suriya Praditsathaporn, Somkuan Kaviya, Preecha P. Yupapin -
Review of Agile Case Studies for Applicability to Aircraft Systems Integration
Abstract The current state of the art of aircraft systems integration is similar to the traditional serial software engineering waterfall method. Agile methods transformed software engineering with a focus on incremental iterative value added...
2013 / Robert Carlson, Richard Turner -
Hierarchical Model to Optimize Performance in Logistics Policies: Multi Attribute Analysis
Abstract The purpose of this paper is to propose a new application methodology to evaluate the best inventory strategy through the use of an integrated approach based on Analytic Hierarchy Process (AHP) and Simulation. Our specific aim is to...
2012 / Fabio De Felice, Antonella Petrillo -
Support for checking plagiarism in e-learning
Abstract The paper attempts to analyze current situation in plagiarism detection and to analyze existing methods and tools for checking the plagiarized programming code and natural language (particularly Slovak) text. Then, we describe our approach...
2010 / Daniela Chuda, Pavol Navrat -
Secure ubiquitous authentication protocols for RFID systems2012 / Md M Morshed, Anthony Atkins, Hongnian Yu
-
Tactics for mechanized reasoning: a commentary on Milner (1984) 'The use of machines to assist in rigorous proof'2015 / M. J. C. Gordon
-
A Multi-level Optimization Strategy to Improve the Performance of Stencil Computation
Abstract Stencil computation represents an important numerical kernel in scientific computing. Leveraging multi-core or many-core parallelism to optimize such operations represents a major challenge due to both the bandwidth demand and the low...
2017 / Gauthier Sornet, Fabrice Dupros, Sylvain Jubertie -
Security Isolation Strategy Mechanism for Lightweight Virtualization Environment2017 / Qian Liu, Xiao-Yong Li, Jian Du, Gang Liu
-
How would information disclosure influence organizations’ outbound spam volume? Evidence from a field experiment2016 / Shu He, Gene Moo Lee, Sukjin Han, Andrew B. Whinston
-
Efficient Use of Sounding Board Method at Project Milestones and its Potentials for Virtualization
Abstract Project milestones in major product development projects are often the only possibility to discuss critical points with all relevant stakeholders. This is even truer in the context of globalization as these projects are run by worldwide...
2017 / Benjamin Walter, Albert Albers, Alexandra Schelleis, Armin Kurrle -
Unified Formal Model for Synchronous and Self-Synchronizing Stream Ciphers
Abstract Stream ciphers encrypt individual characters of a plaintext message one at a time, using an encryption scheme which varies with time. Stream ciphers are commonly classified as synchronous or self-synchronizing. As a general rule, a stream...
2017 / Bogdan Crainicu -
An Exact Resolution for the Probabilistic Traveling Salesman Problem under the A Priori Strategy
Abstract The Probabilistic Traveling Salesman Problem (PTSP) is an extension of the classical Traveling Salesman Problem (TSP). The main difference is the stochastic presence of the customers, that is, the number of them to be visited each time is a ...
2017 / Mohamed Abdellahi Amar, Walid Khaznaji, Monia Bellalouna -
An Introduction to Multi-trapdoor Hash Functions and It's Applications
Abstract Trapdoor hash function is a highly useful cryptographic primitive for building a wide variety of novel signature schemes, like chameleon, online-offline, threshold, proxy, sanitizable and amortized signatures. These signature schemes form...
2015 / Mukesh Singhal -
Seventeenth Annual DFRWS Conference2017 /