Computer and information sciences topic list of research papers
-
Tuning basic Linear Algebra Routines for Hybrid CPU+GPU Platforms
Abstract The introduction of auto-tuning techniques in linear algebra routines using hybrid combinations of multiple CPU and GPU computing resources is analyzed. Basic models of the execution time and information obtained during the installation of...
2014 / Gregorio Bernabé, Javier Cuenca, Luis-Pedro García, Domingo Giménez -
Analysing the Effectiveness of Wearable Wireless Sensors in Controlling Crowd Disasters
Abstract The Love Parade disaster in Duisberg, Germany lead to several deaths and injuries. Disasters like this occur due to the existence of high densities in a limited area. We propose a wearable electronic device that helps reduce such disasters...
2014 / Teo Yu Hui Angela, Vaisagh Viswanathan, Michael Lees, Wentong Cai -
Analysis of the potentials of multi criteria decision analysis methods to conduct sustainability assessment
Abstract Sustainability assessments require the management of a wide variety of information types, parameters and uncertainties. Multi criteria decision analysis (MCDA) has been regarded as a suitable set of methods to perform sustainability...
2014 / Marco Cinelli, Stuart R. Coles, Kerry Kirwan -
Optimizing Dynamic Resource Allocation
Abstract We present a formulation, solution method, and program acceleration techniques for two dynamic control scenarios, both with the common goal of optimizing resource allocations. These approaches allocate resources in a non-myopic way,...
2014 / Lucas W. Krakow, Louis Rabiet, Yun Zou, Guillaume Iooss, Edwin K.P. Chong, et al. -
The WorkWays Problem Solving Environment
Abstract Science gateways allow computational scientists to interact with a complex mix of mathematical models, software tools and techniques, and high performance computers. Accordingly, various groups have built high-level problem-solving...
2014 / Hoang Nguyen, David Abramson, Timoleon Kipouros -
Performance Comparison of Centralized and Distributed Network Models to Support QoS in Fixed WiMAX
Abstract Worldwide Interoperability for Microwave Access (WiMAX) defines different data delivery services that can be used in order to satisfy Quality of Service (QoS) requirements such as flexibility and efficiency. In this paper a new distributed...
2014 / Ibrahim A. Lawal, Abas Md Said, Abubakar Aminu Mu’azu, Peer Azmat Shah -
With evolution for revolution: managing FEDERICA for future Internet research2009 / P. Szegedi, S. Figuerola, M. Campanella, V. Maglaris, C. Cervello-Pastor
-
The Effect of Teaching Vocabulary through the Diglot –Weave Technique on Vocabulary Learning of Iranian High School Students
Abstract The present study aimed at investigating the effect of teaching vocabulary through the diglot weave technique. Sixty students were chosen and divided into two groups of 30. Control groups received the method of teaching vocabulary and the...
2014 / Azadeh Nemati, Ensieh Maleki -
A Multicriterion Fuzzy Classification Method with Greedy Attribute Selection for Anomaly-based Intrusion Detection
Abstract Intrusion is widely recognized as a chronic and recurring problem of computer systems’ security with the continual changes and increasing volume of hacking techniques. This paper explores a new countermeasure approach for anomaly-based...
2014 / El-Sayed M. El-Alfy, Feras N. Al-Obeidat -
Modelling mammographic microcalcification clusters using persistent mereotopology
Abstract In mammographic imaging, the presence of microcalcifications, small deposits of calcium in the breast, is a primary indicator of breast cancer. However, not all microcalcifications are malignant and their distribution within the breast can...
2014 / Harry Strange, Zhili Chen, Erika R.E. Denton, Reyer Zwiggelaar -
Fail-stop Failure Recovery in Neighbor Replica Environment
Abstract Failure recovery is a nontrivial property for current distributed systems. An autonomous failure recovery in a distributed system is the ability of a system to execute self-corrective action when an instance or a subset of the system...
2013 / Ahmad Shukri Mohd Noor, Mustafa Mat Deris -
Multiple Applications Sharing for Effective Load Balancing in Secured Distributed Environment
Abstract Distributed environment has primary advantages of high performance, availability, and extensibility at low cost. When load of running applications are more and limited number of nodes present, then sharing of applications definitely improve ...
2016 / Kavita Kimmatkar, Urmila Shrawankar -
Rewrite Systems with Constraints
Abstract We extend a widely used concept of rewrite systems with a unit holding a kind of global information which can influence and can be influenced by rewriting. The unit is similar to the store used in concurrent constraint programming, and can...
2004 / Jan Strejček -
Flexibility and Interoperability in CORBA Security
Abstract This paper will discuss the fundamental clash between flexibility and interoperability in CORBA security and in distributed object systems security in general. Also, the impact of flexibility and interoperability issues on the security of...
2004 / Ulrich Lang, Rudolf Schreiner -
Reducing the Overhead of Dynamic Analysis1 1This work was supported in part by the National Science Foundation under grants CCR-9970707 and CCR-9987435.
Abstract Dynamic analysis (instrumenting programs with code to detect and preven errors during program execution) can be an effective approach to debugging, as well as an effective means to prevent harm being caused by malicious code. One problem...
2004 / Suan Hsi Yong, Susan Horwitz -
Towards a Process Algebra for Shared Processors
Abstract We present initial work on a timed process algebra that models sharing of processor resources allowing preemption at arbitrary points in time. This enables us to model both the functional and the timely behaviour of concurrent processes...
2004 / Mikael Buchholtz, Jacob Andersen, Hans Henrik Løvengreen -
A Multi-Adjoint Approach to Similarity-Based Unification
Abstract A formal model for similarity-based fuzzy unification in multi-adjoint logic programs is presented. On this computational model, a similarity-based unification approach is constructed by simply adding axioms of fuzzy similarities and using...
2004 / Jesús Medina, Manuel Ojeda-Aciego, Peter Vojtáš -
Approximation and Computation of Arbitrage in Frictional Foreign Exchange Market (Extended Abstract)
Abstract In this paper we study the computational complexity of arbitrage in a frictional foreign exchange market with bid-ask spreads, bound and integrality constraints. We show that the problem of detecting the existence of arbitrage is...
2004 / Mao-cheng Cai, Xiaotie Deng -
ArchExplorer for Automatic Design Space Exploration2010 / Veerle Desmet, Sylvain Girbal, Alex Ramirez, Olivier Temam, Augusto Vega
-
Implementing CCS in Maude 2
Abstract This paper describes in detail how to bridge the gap between theory and practice in a new implementation of the CCS operational semantics in Maude, where transitions become rewrites and inference rules become conditional rewrite rules with...
2005 / Alberto Verdejo, Narciso Martí-Oliet