Computer and information sciences topic list of research papers
-
Adaptive tourist recommendation system: conceptual frameworks and implementations2014 / Leila Etaati, David Sundaram
-
Service Provisioning through Opportunistic Computing in Mobile Clouds
Abstract Mobile clouds are a new paradigm enabling mobile users to access the heterogeneous services present in a pervasive mobile environment together with the rich service offers of the cloud infrastructures. In mobile computing environments...
2014 / Davide Mascitti, Marco Conti, Andrea Passarella, Laura Ricci -
Healnect – A System to Help Patients of Physical Therapy Achieve their Therapeutic Exercises
Abstract This paper describes a framework to perform therapeutic exercises. The work includes a Kinect camera to capture de patient's movements and two applications: a desktop and a Web application. The Web application is used to provide the...
2014 / Marco Talento, Tiago Martins, Rui Jesus, Arnaldo Abrantes -
A Multidisciplinary, Expert-based Approach for the Identification of Lifetime Impacts in Asset Life Cycle Management
Abstract Everyday our lives are dependent on countless physical structures. These assets represent an enormous value for their owners and for society at large. To grasp the full potential of these assets, a deep and thorough understanding of an...
2014 / R.J. (Richard) Ruitenburg, A.J.J. Braaksma, L.A.M. van Dongen -
Microblogging Architecture and Scenarios for Learning in Mobile Groups
Abstract Over the last years, microblogging has become one of the first words associated with online interactions, conversational discourse, communication and collaboration through social networks, having important applications at all educational...
2014 / Carmen Holotescu, Vladimir Creţu, Gabriela Grosseck -
A Systematic Approach for Analysis Workshops in Enterprise 2.0 Projects
Abstract Enterprise 2.0 projects are recently gaining increasing interest among organizations of all sizes and across industries. Especially for organizations with multifaceted business processes and the necessity of intra- and inter-organizational...
2014 / Dietmar Nedbal, Mark Stieninger, Andreas Auinger -
Real-time detection of MAC layer misbehavior in mobile ad hoc networks
Abstract The MAC layer misbehavior of the IEEE 802.11 standard can have a negative impact on the wireless network’s performance, similar to the effects of denial of service attacks. The goal of this misbehavior was handling the protocol to increase...
2015 / Abdessadek Aaroud, Mohammed-Alamine El Houssaini, Ali El Hore, Jalel Ben-Othman -
Adaptive double chain quantum genetic algorithm for constrained optimization problems
Abstract Optimization problems are often highly constrained and evolutionary algorithms (EAs) are effective methods to tackle this kind of problems. To further improve search efficiency and convergence rate of EAs, this paper presents an adaptive...
2014 / Haipeng Kong, Ni Li, Yuzhong Shen -
Off-detector electronics for a high-rate CSC detector2004 / N. Drego, D. Hawkins, A.J. Lankford, Y. Li, M. Medve, et al.
-
A novel hybrid algorithm of GSA with Kepler algorithm for numerical optimization
Abstract It is now well recognized that pure algorithms can be promisingly improved by hybridization with other techniques. One of the relatively new metaheuristic algorithms is Gravitational Search Algorithm (GSA) which is based on the Newton laws. ...
2015 / Soroor Sarafrazi, Hossein Nezamabadi-pour, Saeid R. Seydnejad -
Robust and Invisible Image Watermarking in RGB Color Space Using SVD
Abstract In this paper, two separate methods for robust and invisible image watermarking are proposed in RGB color space. In the first method, gray scale of watermark is embedded on the blue color channel elements and in second method, the blue...
2015 / D. Vaishnavi, T.S. Subashini -
An Energy Efficient Data Gathering in Dense Mobile Wireless Sensor Networks2014 / R. Velmani, B. Kaarthick
-
Applications and performance of the non-numerical ranking preferences method for post-Pareto optimality
Abstract Most real-world engineering optimization problems are implicitly or explicitly multi-objective, and approaches to find the best feasible solution to be implemented can be quite challenging for the decision-maker. In this kind of problem,...
2011 / Victor M. Carrillo, Oswaldo Aguirre, Heidi Taboada -
The Double-System Architecture for Trusted OS
Abstract With the development of computer science and technology, current secure operating systems failed to respond to many new security challenges. Trusted operating system (TOS) is proposed to try to solve these problems. However, there are no...
2012 / Yong Zhao, Yu Li, Jing Zhan -
A survey of performance enhancement of transmission control protocol (TCP) in wireless ad hoc networks2011 / Noor Mast, Thomas J Owens
-
Programming Errors in Traversal Programs Over Structured Data
Abstract Traversal strategies provide an established means of describing automated queries, analyses, transformations, and other non-trivial computations on deeply structured data (including, most notably, data representations of software artifacts...
2009 / Ralf Lämmel, Simon Thompson, Markus Kaiser -
Vicious Circles in Orthogonal Term Rewriting Systems
Abstract In this paper we first study the difference between Weak Normalization (WN) and Strong Normalization (SN), in the framework of first order orthogonal rewriting systems. With the help of the Erasure Lemma we establish a Pumping Lemma,...
2005 / Jeroen Ketema, Jan Willem Klop, Vincent van Oostrom -
Detecting and Preventing Type flaws: a Control Flow Analysis with Tags
Abstract A type flaw attack on a security protocol is an attack where an honest principal is cheated on interpreting a field in a message as the one with a type other than the intended one. In this paper, we shall present an extension of the LySa...
2007 / Chiara Bodei, Pierpaolo Degano, Han Gao, Linda Brodo -
Constraint Functional Logic Programming Revisited
Abstract In this paper we propose a new generic scheme C F L P ( D ) ...
2005 / F. Javier López-Fraguas, Mario Rodríguez-Artalejo, Rafael del Vado Vírseda -
Some Investigations Concerning the CTMC and the ODE Model Derived From Bio-PEPA
Abstract Bio-PEPA is a recently defined language for the modelling and analysis of biochemical networks. It supports an abstract style of modelling, in which discrete levels of concentration within a species are considered instead of individual...
2009 / Federica Ciocchetta, Andrea Degasperi, Jane Hillston, Muffy Calder