Computer and information sciences topic list of research papers
-
Corrigendum2013 /
-
Effects of Multiwalled Carbon Nanotube Surface Modification and Purification on Bovine Serum Albumin Binding and Biological Responses2016 / Wei Bai, Zheqiong Wu, Somenath Mitra, Jared M. Brown
-
Algorithm Based New Tone Reservation Method for Mitigating PAPR in OFDM Systems2017 / Tanmoy Saha, Shreyasi Chakrabarty, Subhankar Bhattacharjee, Sanjib Sil
-
Automatic relationship extraction from agricultural text for ontology construction
Abstract In the present era of Big Data the demand for developing efficient information processing techniques for different applications is expanding steadily. One such possible application is automatic creation of ontology. Such an ontology is...
2017 / Neha Kaushik, Niladri Chatterjee -
Using leap motion to investigate the emergence of structure in speech and language2016 / Kerem Eryilmaz, Hannah Little
-
A tree does not make a well-formed sentence: Improving syntactic string-to-tree statistical machine translation with more linguistic knowledge
Abstract Synchronous context-free grammars (SCFGs) can be learned from parallel texts that are annotated with target-side syntax, and can produce translations by building target-side syntactic trees from source strings. Ideally, producing syntactic...
2014 / Rico Sennrich, Philip Williams, Matthias Huck -
Height drift correction in non-raster atomic force microscopy
Abstract We propose a novel method to detect and correct drift in non-raster scanning probe microscopy. In conventional raster scanning drift is usually corrected by subtracting a fitted polynomial from each scan line, but sample tilt or large...
2013 / Travis R. Meyer, Dominik Ziegler, Christoph Brune, Alex Chen, Rodrigo Farnham, et al. -
For Safety and Security Reasons: The Cost of Component-Isolation in IoT2016 / Alexander Zuepke, Kai Beckmann, Andreas Zoor, Reinhold Kroeger
-
Performance of combined constellation shaping and bit interleaved coded modulation with iterative decoding (BICM-ID)2011 / T. Arafa, W. Sauer-Greff, R. Urbansky
-
Technosocial predictive analytics for security informatics2012 / Antonio Sanfilippo, Nigel Gilbert, Mark Greaves
-
A new fast algorithm for solving the minimum spanning tree problem based on DNA molecules computation
Abstract The minimum spanning tree (MST) problem is to find minimum edge connected subsets containing all the vertex of a given undirected graph. It is a vitally important NP-complete problem in graph theory and applied mathematics, having numerous...
2013 / Zhaocai Wang, Dongmei Huang, Huajun Meng, Chengpei Tang -
Survey on Security Issues in Vehicular Ad Hoc Networks
Abstract Vehicular Ad hoc NETworks are special case of ad hoc networks that, besides lacking infrastructure, communicating entities move with various accelerations. Accordingly, this impedes establishing reliable end-to-end communication paths and...
2015 / Bassem Mokhtar, Mohamed Azab -
GiMMiK—Generating bespoke matrix multiplication kernels for accelerators: Application to high-order Computational Fluid Dynamics
Abstract Matrix multiplication is a fundamental linear algebra routine ubiquitous in all areas of science and engineering. Highly optimised BLAS libraries (cuBLAS and clBLAS on GPUs) are the most popular choices for an implementation of the General...
2016 / Bartosz D. Wozniak, Freddie D. Witherden, Francis P. Russell, Peter E. Vincent, Paul H.J. Kelly -
Coalgebraic Modal Logic Beyond Sets
Abstract Polyadic coalgebraic modal logic is studied in the setting of locally presentable categories. It is shown that under certain assumptions, accessible functors admit expressive logics for their coalgebras. Examples include typical functors...
2007 / Bartek Klin -
Process Algebras in the Age of Ubiquitous Computing
Abstract We discuss why process theories are such an enchanting field, motivated by intriguing questions rather than immediate engineering needs. We also consider one way to use the resulting understanding in the context of so-called ubiquitous...
2006 / Kohei Honda -
A level of service scheme for microscopic simulation of pedestrians that integrates queuing, uni-and multi-directional flow situations2011 / Tobias Kretz
-
QRS detection using K-Nearest Neighbor algorithm (KNN) and evaluation on standard ECG databases
Abstract The performance of computer aided ECG analysis depends on the precise and accurate delineation of QRS-complexes. This paper presents an application of K-Nearest Neighbor (KNN) algorithm as a classifier for detection of QRS-complex in ECG....
2012 / Indu Saini, Dilbag Singh, Arun Khosla -
Redundancy of minimal weight expansions in Pisot bases
Abstract Motivated by multiplication algorithms based on redundant number representations, we study representations of an integer n as a sum n = ...
2011 / Peter J. Grabner, Wolfgang Steiner -
Expressive Completeness for LTL With Modulo Counting and Group Quantifiers
Abstract Kamp showed that linear temporal logic is expressively complete for first order logic over words. We give a Gabbay style proof to show that linear temporal logic extended with modulo counting and group quantifiers (introduced by...
2011 / A.V. Sreejith -
Web Application Performance Modeling Using Layered Queueing Networks
Abstract In this paper, a Layered Queueing Network (LQN) performance model is used for studying an Apache-PHP web application with PostgreSQL backend-database. Performance evaluation is done by obtaining load test measurements and by solving the LQN ...
2011 / Yasir Shoaib, Olivia Das