Computer and information sciences topic list of research papers
-
Model-checking Distributed Components: The Vercors Platform
Abstract This article presents a component verification platform called Vercors providing means to analyse the behaviour properties of applications built from distributed components. From the behavioural specification of primitive components, and...
2007 / Tomás Barros, Antonio Cansado, Eric Madelaine, Marcela Rivera -
Dynamic Transition Refinement
Abstract Refinement of Petri nets is well suited for the hierarchical design of system models. It is used to represent a model at different levels of abstraction. Usually, refinement is a static concept. For many scenarios,...
2007 / Michael Köhler, Heiko Rölke -
Rank and Select for Succinct Data Structures
Abstract In this paper, we study different approaches for rank and select on sequences of bytes and propose new implementation strategies. Extensive experimental evaluation comparing the efficiency of the different alternatives are provided. ...
2009 / Antonio Fariña, Susana Ladra, Oscar Pedreira, Ángeles S. Places -
Specification and Runtime Verification of Java Card Programs
Abstract Java Card is a version of Java developed to run on devices with severe storage and processing restrictions. The applets that run on these devices are frequently intended for use in critical, highly distributed, mobile conditions. They are...
2009 / Umberto Souza da Costa, Anamaria Martins Moreira, Martin A. Musicante, Plácido A. Souza Neto -
Type-2 Computability and Moore's Recursive Functions
Abstract Regarding effectivity of functions on the reals, there have been several proposed models of analog, continuous-time computation, as opposed to the digital, discrete nature of the type-2 computability. We study one of them, Moore's real...
2005 / Akitoshi Kawamura -
Nonmonotonic Trust Management for P2P Applications
Abstract Community decisions about access control in virtual communities are non-monotonic in nature. This means that they cannot be expressed in current, monotonic trust management languages such as the family of Role Based Trust Management...
2006 / Marcin Czenko, Ha Tran, Jeroen Doumen, Sandro Etalle, Pieter Hartel, et al. -
Empirical comparison of local structural similarity indices for collaborative-filtering-based recommender systems
Abstract Collaborative filtering is one of the most successful recommendation techniques, which can effectively predict the possible future likes of users based on their past preferences. The key problem of this method is how to define the...
2010 / Qian-Ming Zhang, Ming-Sheng Shang, Wei Zeng, Yong Chen, Linyuan Lü -
Long distance wireless sensor networks applied in coal mine
Abstract To remedy the deficiency of the present monitoring systems in coal mine, this paper designs the integrated mine network composed of wireless sensor networks and other technologies, and analyzes the problems of wireless sensor networks...
2009 / Yang Yuan, Zhang Shen, Wang Quan-fu, Song Pei -
Additional service security of e-commerce in mine enterprises
Abstract With the e-commerce developing, some mine enterprises established its own websites in order to provide network services. Now, these enterprises have to provide more services for the competition of e-business. The extend services as annexes...
2009 / Bao Yu, Zeng Guo-sun, Zhao Liang -
Day-Ahead Electricity Price Forecasting Using a Hybrid Principal Component Analysis Network2012 / Ying-Yi Hong, Ching-Ping Wu
-
Towards Optimized Placement of Cameras for Gait Pattern Recognition
Abstract Locomotion of an individual i.e., gait is proven to be unique. Recent past has seen a paradigm shift while considering gait as a trusted biometric trait even though it is a behavioral biometric. The study of gait includes body mechanics,...
2012 / Rahul Raman, Pankaj K. Sa, Sambit Bakshi, Bansidhar Majhi -
Effects of Velocity on Performance of DYMO, AODV and DSR Routing Protocols in Mobile Ad-hoc Networks
Abstract A Mobile Ad-hoc Network (MANET) is a self-configuring, infrastructure-less network of mobile devices (nodes) where nodes communicate with each other using multi-hop wireless links. This paper, analyses the effect of mobility on performance...
2012 / Lakhan Dev Sharma, Nirmal Roberts -
Multimodal Biometric Authentication using PSO based Watermarking
Abstract Multimodal Biometrics is the usage of multiple biometric indicators by personal identification systems for identifying individuals. It is applied to secure and authenticate the biometric data, enhance accuracy of recognition and reduce...
2012 / Punam Bedi, Roli Bansal, Priti Sehgal -
Design of a Power Line Communications Transceiver Based on OFDM
Abstract Power Line Communications (PLC) is a technology that takes advantage of the existing electrical infrastructure to deploy communication networks. This paper proposes an architecture for the physical layer (PHY) of a PLC transceiver based on...
2014 / Edward Mitacc Meza, Jorge Benavides Aspiazu -
Concrete Data Structures as Games
Abstract A result by Curien establishes that filiform concrete data structures can be viewed as games. We extend the idea to cover all stable concrete data structures. This necessitates a theory of games with an equivalence relation on positions. We ...
2009 / Andrea Schalk, José Juan Palacios-Perez -
QUACK: A Platform for the Quality of New Generation Integrated Embedded Systems
Abstract Over the last two years, the QUACK project investigated a new methodology for assessing the quality of heterogeneous, modular and configurable embedded systems, i.e., systems made out of a number of hardware and software components, usually ...
2005 / Mauro Pezzè, Andrea Baldini, Giovanni Denaro, Giuseppe Lipari, Matteo Rossi, et al. -
Power allocation in cooperative sensor networks: a stochastic approximation approach2015 / Mohammad Abdul Azim, Zeyar Aung
-
Development of Navigation Skills Through Audio Haptic Videogaming in Learners Who are Blind
Abstract This study presents the development of a video game with audio and haptic interfaces that allows for the stimulation of orientation and mobility skills in people who are blind through the use of virtual environments. We evaluate the...
2012 / Jaime Sánchez -
Improving Inter-Domain Fast Handover Using MIH Services in Mobile WiMAX2012 / Ghaida A. Al-Suhail, Huda J. Al-Hammedy
-
MIMO Detector for Uncoded Symbols based on Complex Sphere Decoder and Manhattan Metric
Abstract For communication standards with high transfer rates (WiMAX, WiFi, LTE), which use MIMO (Multiple Input - Mul- tiple Output) systems, detectors with reduced computational complexity that achieve a good Bit Error Rate (BER) performance are...
2013 / Juan Francisco Castillo-León, Ulises Pineda-Rico, Enrique Stevens-Navarro