Computer and information sciences topic list of research papers
-
Complexity and algorithms for copy-number evolution problems2017 / Mohammed El-Kebir, Benjamin J. Raphael, Ron Shamir, Roded Sharan, Simone Zaccaria, et al.
-
FBOS: Function/Behaviour–Oriented Search
Abstract This paper introduces a patent searching framework to assess the state of the art of a product or a technology and to support technology transfer activities. It combines several dimensions (IPC, Object & Behaviour/Function keywords)...
2015 / Tiziano Montecchi, Davide Russo -
Bounding the Clique-Width of H -Free Chordal Graphs2017 / Andreas Brandstädt, Konrad K. Dabrowski, Shenwei Huang, Daniël Paulusma
-
Incremental Localization Algorithm Based on Regularized Iteratively Reweighted Least Square2016 / Xiaoyong Yan, Zhong Yang, Yu Liu, Xiaoduo Xu, Huijun Li
-
Quantifying retrieval bias in Web archive search2017 / Thaer Samar, Myriam C. Traub, Jacco van Ossenbruggen, Lynda Hardman, Arjen P. de Vries
-
KNIME for reproducible cross-domain analysis of life science data
Abstract Experiments in the life sciences often involve tools from a variety of domains such as mass spectrometry, next generation sequencing, or image processing. Passing the data between those tools often involves complex scripts for controlling...
2017 / Alexander Fillbrunn, Christian Dietz, Julianus Pfeuffer, René Rahn, Gregory A. Landrum, et al. -
Virtual haptic system for intuitive planning of bone fixation plate placement
Abstract Placement of pre-contoured fixation plate is a common treatment for bone fracture. Fitting of fixation plates on fractured bone can be preoperatively planned and evaluated in 3D virtual environment using virtual reality technology. However, ...
2017 / Kup-Sze Choi, Beat Schmutz, Xue-Jian He, Wing-Leung Chan, Michael Schuetz -
Serious Games for Integral Sustainable Design: Level 1
Abstract The use of videogames to provide engaging learning contexts known as serious games has emerged over several years and has proved effective in many contexts, but has minimal uptake in sustainable design education. We present a project that...
2017 / Jules Moloney, Anastasia Globa, Rui Wang, Astrid Roetzel -
Analysis of Object Location Accuracy for iBeacon Technology based on the RSSI Path Loss Model and Fingerprint Map2016 / Damian E. Grzechca, Piotr Pelczar, Lukas Chruszczyk
-
Overlaying social information: The effects on users’ search and information-selection behavior
Abstract Previous research investigated how to leverage the new type of social data available on the web, e.g., tags, ratings and reviews, in recommending and personalizing information. However, previous works mainly focused on predicting ratings...
2017 / Valeria Orso, Tuukka Ruotsalo, Jukka Leino, Luciano Gamberini, Giulio Jacucci -
From the evaluation of existing solutions to an all-inclusive package for biobanks2017 / Heimo Müller, Nicolas Malservet, Philip Quinlan, Robert Reihs, Matthieu Penicaud, et al.
-
OUTRIDER: Optimizing the mUtation Testing pRocess In Distributed EnviRonments
Abstract The adoption of commodity clusters has been widely extended due to its cost-effectiveness and the evolution of networks. These systems can be used to reduce the long execution time of applications that require a vast amount of computational ...
2017 / Pablo C. Cañizares, Alberto Núñez, Juan de Lara -
Markov Chain methods for the Bipartite Boolean Quadratic Programming Problem
Abstract We study the Bipartite Boolean Quadratic Programming Problem (BBQP) which is an extension of the well known Boolean Quadratic Programming Problem (BQP). Applications of the BBQP include mining discrete patterns from binary data,...
2017 / Daniel Karapetyan, Abraham P. Punnen, Andrew J. Parkes -
Matchings with Lower Quotas: Algorithms and Complexity2016 / Ashwin Arulselvan, Ágnes Cseh, Martin Groß, David F. Manlove, Jannik Matuschke
-
Link Prediction in Evolving Networks Based on Popularity of Nodes2017 / Tong Wang, Xing-Sheng He, Ming-Yang Zhou, Zhong-Qian Fu
-
Selfrando: Securing the Tor Browser against De-anonymization Exploits2016 / Mauro Conti, Stephen Crane, Tommaso Frassetto, Andrei Homescu, Georg Koppen, et al.
-
E-CDGM: An Evolutionary Call-Dependency Graph Modularization Approach for Software Systems2016 / Habib Izadkhah, Islam Elgedawy, Ayaz Isazadeh
-
Efficient Verifiable Range and Closest Point Queries in Zero-Knowledge2016 / Esha Ghosh, Olga Ohrimenko, Roberto Tamassia
-
Improved Hybrid LEACH Based Approach for Preserving Secured Integrity in Wireless Sensor Networks
Abstract Wireless sensor networks are must important nowadays and with rapid propagation. Also, when the accuracy of data is most importantly in the Internet of Things, detecting sensor data with faulty readings is an important issue of secure...
2017 / Nejla Rouissi, Hamza Gharsellaoui -
Long-term influence of user identification based on touch operation on smart phone
Abstract In our previous study, we collected a touch operations history when 40 subjects performed basic operation, text browsing, and web browsing using our Android application. From the touch history, we extracted 8 or 16 features for 6 gestures...
2017 / Yuji Watanabe, Liu Kun