Computer and information sciences topic list of research papers
-
Multiple Data-Dependent Kernel Fisher Discriminant Analysis for Face Recognition2014 / Yue Liu, Yibing Li, Hong Xie, Dandan Liu
-
Fiber over Wireless Chromatic Dispersion Compensation for a Better Quality of Service2006 / S. Guizani, M. Razzak, H. Hamam, Y. Bouslimani, A. Cheriti
-
Graphical modeling and query language for hospitals2013 / Janis Barzdins, Juris Barzdins, Edgars Rencis, Agris Sostaks
-
TopFed: TCGA Tailored Federated Query Processing and Linking to LOD2014 / Muhammad Saleem, Shanmukha S. Padmanabhuni, Axel-Cyrille Ngonga Ngomo, Aftab Iqbal, Jonas S. Almeida, et al.
-
Maximizing the profits of cloud service providers via dynamic virtual resource renting approach2015 / Ao Zhou, Qibo Sun, Lei Sun, Jinglin Li, Fangchun Yang
-
Recursive load balance scheme for two-tier cellular networks using enhanced inter-cell interference coordination2015 / Myunghoon Hong, Seungyoung Park
-
Realtime cerebellum: A large-scale spiking network model of the cerebellum that runs in realtime using a graphics processing unit
Abstract The cerebellum plays an essential role in adaptive motor control. Once we are able to build a cerebellar model that runs in realtime, which means that a computer simulation of 1 s in the simulated world completes within 1 s in the real...
2013 / Tadashi Yamazaki, Jun Igarashi -
The Social Amplifier—Reaction of Human Communities to Emergencies2013 / Yaniv Altshuler, Michael Fire, Erez Shmueli, Yuval Elovici, Alfred Bruckstein, et al.
-
Dimensionality Reduction Based on Neighborhood Preserving and Marginal Discriminant Embedding
Abstract Data with high dimensionality often occurs, which will produce large time and energy overheads when directly used in classification tasks. So, as one of the most important fields in machine learning, dimensionality reduction has been paid...
2012 / Yuan-Dong Lan, Huifang Deng, Tao Chen -
The Impact of Cloud Computing Technology on Legal Infrastructure within Internet—Focusing on the Protection of Information Privacy
Abstract The main purpose of this article is to focus on the issue of protecting information privacy through the newly developed cloud computing technology. This article will first introduce the characteristics of cloud computing technology. Then...
2012 / Fa-Chang Cheng, Wen-Hsing Lai -
The Building Blocks of a PaaS2013 / Cláudio Teixeira, Joaquim Sousa Pinto, Ricardo Azevedo, Tiago Batista, André Monteiro
-
Probabilistic-Fuzzy Knowledge-Based System for Managerial Applications2012 / Katarzyna Rudnik, Anna Walaszek-Babiszewska
-
Study on Similar Engineering Decision Problem Identification Based On Combination of Improved Edit-Distance and Skeletal Dependency Tree with POS
Abstract To improve the efficiency of solution analyzing of a new engineering decision problem in decision support system (DSS), this paper utilizes sentence similarity computing to identify solved engineering decision problems in DSS which new...
2011 / Dong-bin Hu, Jun Ding -
Interference activity aware multi-path routing protocol2012 / Bao-Qiang Kan, Jian-Huan Fan
-
Recursive analytical performance evaluation of broadcast protocols with silencing: application to VANETs2012 / Stefano Busanelli, Gianluigi Ferrari, Roberto Gruppini
-
GPU-accelerated adjoint algorithmic differentiation
Abstract Many scientific problems such as classifier training or medical image reconstruction can be expressed as minimization of differentiable real-valued cost functions and solved with iterative gradient-based methods. Adjoint algorithmic...
2015 / Felix Gremse, Andreas Höfter, Lukas Razik, Fabian Kiessling, Uwe Naumann -
SmartGuide – A Smartphone Museum Guide with Ultrasound Control
Abstract While smartphones are well equipped for outdoor localization tasks, they usually do not provide support for identifying an indoor point of interest. This especially prohibits the context aware use of smartphones for guidance tasks inside a...
2011 / Pascal Bihler, Paul Imhoff, Armin B. Cremers -
Greedy-Face-Greedy Routing based Human Tracking in Mobile Social Networks
Abstract Mobile phones are increasingly being equipped with hardware and software services allowing them to determine their locations, however, support for building location-based applications remains a challenging problem. The most widely used...
2011 / Yingchi Mao -
Finding Commonalities in RFID Semantic Streams
Abstract A stream is a time-ordered sequence of data values. It is possible to define a semantic stream as a time-ordered sequence of metadata, i.e., a concept stream. It may derive from a collection of semantic annotations referred to...
2011 / Michele Ruta, Simona Colucci, Floriano Scioscia, Eugenio Di Sciascio, Francesco M. Donini -
Multi-relational Clustering Based on Relational Distance
Abstract When clustering the tuples in the target table which is in a relational database, the prior task is to exactly and effectively calculate the relational distance between tuples. A lot of methods are used today, such as the relational...
2012 / Luan Luan, Yun Li, Jiang Yin, Yan Sheng