Computer and information sciences topic list of research papers
-
Domain Triangulation between Convex Polytopes
Abstract In this paper, we propose a method for solving the problem triangulation of a domain between convex polyhedrons in d- dimensional space using Delaunay triangulation in O(N2) time. Novelty of our work is in using a modified Delaunay...
2013 / Vasyl Tereshchenko, Sergiy Pilipenko, Andriy Fisunenko -
Academic Content – A Valuable Resource to Establish your Presence on the Web
Abstract It has been proven beyond any doubt that high rankings on search engine result pages are non-negotiable for commercial websites. These high rankings can be achieved through a variety of methods, ethical and unethical. Both are being used...
2013 / M. Weideman -
An Evaluation of the Effectiveness of Teacher Training: Some Results from a Study on the Transfer Factors of Teacher Training in Barcelona Area
Abstract Teacher training is a key component for a high quality education (Buchberger, Campos, Kallós, Stephenson, 2000); and transfer of teacher training, as it shows how trainees apply the competences they have learnt, is a relevant aspect to...
2012 / Anna Ciraso -
A framework for ABFT techniques in the design of fault-tolerant computing systems2011 / Hodjat Hamidi, Abbas Vafaei, Seyed Monadjemi
-
The IIC interface based on ATmega8 realizes the applications of PS/2 keyboard/mouse in the system
Abstract This paper introduces the PS/2 keyboard/mouse protocol and the transmission characteristics of IIC bus interface, giving the design and hardware circuit for converting the PS/2 keyboard/mouse interface to IIC interface. System analyzes...
2011 / Dai Jiejie, Song Hui -
CaGrid Workflow Toolkit: A taverna based workflow tool for cancer grid2010 / Wei Tan, Ravi Madduri, Alexandra Nenadic, Stian Soiland-Reyes, Dinanath Sulakhe, et al.
-
On Cutwidth Parameterized by Vertex Cover2012 / Marek Cygan, Daniel Lokshtanov, Marcin Pilipczuk, Michał Pilipczuk, Saket Saurabh
-
Slicing XML Documents
Abstract Program slicing is a well-known technique to extract the program statements that (potentially) affect the values computed at some point of interest. In this work, we introduce a novel slicing method for XML documents. Essentially, given an...
2006 / Josep Silva -
Prototyping A&A ReSpecT in Maude
Abstract The formal modelling of programming languages has always been a challenging activity due to the gap occurring between formal definition and actual implementation. On the other hand, the Maude rewriting language has already proven to be a...
2008 / Matteo Casadei, Andrea Omicini, Mirko Viroli -
Developing a web-based system to create, deliver and assess language proficiency within the PAULEX Universitas Project
Abstract This study aims to examine the feasibility of a number of technical solutions implemented in a web-based system designed for the creation and management of online language exams within PAULEX Universitas, a project for the development of an ...
2011 / José Macario de Siqueira, Antonio Martínez-Sáez, Ana Sevilla-Pavón, Ana Gimeno-Sanz -
Audio Binary Halftone Watermarking Algorithm
Abstract Conventional audio watermarking method has the following deficiencies: the embedded watermarking signal bits are too less; the image watermarking pre-process is too simple which reduce the security; the embedded audio watermarking is...
2011 / Huan Li, Zheng Qin, Xuanping Zhang, Xu Wang -
Interface architecture for testing in foreign language education
Abstract The implications of new learning environments have been far-reaching and pervasive (Plass, 1998), at least in the field of interface design both in traditional computer and mobile devices (Fallahkhair, Pemberton, & Griffiths, 2007)....
2009 / Jesús García Laborda -
Some things couples always wanted to know about stable matchings (but were afraid to ask)2006 / Bettina Klaus, Flip Klijn, Jordi Massó
-
Temperature dependence of the optical properties of Bi2O3. A theoretical approach basing on the Kramers-Kronig transformation for polynomial mixed terms models2012 / Gabriel Murariu, Simona Condurache-Bota
-
Offline signature recognition using neural networks approach
Abstract The fact that the signature is widely used as a means of personal verification emphasizes the need for an automatic verification system because of the unfortunate side-effect of being easily abused by those who would feign the...
2011 / Ali Karouni, Bassam Daya, Samia Bahlak -
Exercises recommending for limited time learning
Abstract In this paper we propose a method for personalized recommendation of assignments (tasks or exercises) in an adaptive educational system. Our main goal is to help students to achieve better performance in tests. To achieve this we enhance...
2010 / Pavel Michlík, Mária Bieliková -
An Approximation Algorithm for Vehicle Routing Problems with Hierarchized Traffic Network
Abstract Efficient delivery planning for freight transport is required for reducing environmental load and logistical costs. By using an actual traffic condition, a more realistic delivery plan, increased delivery work efficiency, and CO2 reduction...
2012 / Mariko Okude, Eiichi Taniguchi -
Integrating RFIDs and Smart Objects into a UnifiedInternet of Things Architecture2012 / Evangelos A. Kosmatos, Nikolaos D. Tselikas, Anthony C. Boucouvalas
-
Initial pattern library algorithm for human action recognition
Abstract Human action recognition is currently one of the most active research topics in society management, including human moving detection, human moving classification, human moving tracking, and activity recognition and description. In this...
2012 / H.S. Li, B.H. Xu -
DDDAMS-based Crowd Control via UAVs and UGVs
Abstract Unmanned aerial vehicles (UAVs) and unmanned ground vehicles (UGVs) collaboratively play central roles in intelligence gathering and control in urban/border surveillance and crowd control. In this paper, we first propose a comprehensive...
2013 / Zhenrui Wang, Mingyang Li, Amirreza M. Khaleghi, Dong Xu, Alfonso Lobos, et al.