Computer and information sciences topic list of research papers
-
Evaluate and Determine the Most Appropriate Method to Identify Finger Vein
Abstract In this paper, the performance of a variety of different methods of dimensionality reduction on finger vein database is evaluated to determine the most appropriate one in terms of finger vein recognition. Principal Component Analysis using...
2012 / Sepehr Damavandinejadmonfared, Ali Khalili Mobarakeh, Shahrel Azmin Suandi, Bakhtiar Affendi Rosdi -
Priority Based Call Admission Control Protocol for Videoconference Traffic in Wireless/Cellular Networks
Abstract In this paper, we propose a new CAC protocol which provides videoconference traffic taking multiple services like voice, text and multimedia at a time for multiclass users. In this proposed protocol we use priority on basis of account...
2012 / Kalpana Saha (Roy), Iti Saha Misra -
Internet of Things for Medication Control: Service Implementation and Testing
Abstract RFID technology (Radio Frequency IDentification) enables putting an identification label (e.g. tag) into a certain object and, by means of a reader, get the information related to it without any physical contact. The use of these tags in...
2012 / Isabel Laranjo, Joaquim Macedo, Alexandre Santos -
Developing Social Networks Mashups: An Overview of REST-Based APIs
Abstract The social networks have become in a powerful diffusion media in several fields such as communication, e-commerce and entertainment. However, the development of new applications that combine the functionality of different social networks...
2012 / Mario Andrés Paredes-Valverde, Giner Alor-Hernández, Alejandro Rodr’guez-González, Gandhi Hernández-Chan -
Estimating Non-functional Properties of Component-based Software Based on Resource Consumption
Abstract The consideration of non-functional properties in the component-oriented approach to software development is important for its success. The COMQUAD project defines a system architecture and a development methodology for component-based...
2005 / Marcus Meyerhöfer, Klaus Meyer-Wegener -
Unwinding in Information Flow Security2004 / A. Bossi, R. Focardi, D. Macedonio, C. Piazza, S. Rossi
-
Design and Formal Analysis of Highly Effective Authentication Protocol
Abstract In view of the low efficiency problem in the existing authentication protocols, the paper proposes a highly effective authentication which can authenticate identities of the important entities in the foremost time, as well as the session...
2012 / Mingxia Shi, Huaiqiang Li, Li Chen -
Development of the Control System and Communication Network for Intelligent SF6 High Voltage Circuit-Breaker
Abstract This paper analyses the cause of the major faults of the SF6 high voltage circuit breaker, and then introduces a solution using an embedded control system. The control system consists of the controller for every breaker and a supervisor...
2012 / Qingchang Hao, Guodong Yang, Degang Yang, En Li, Zize Liang, et al. -
Performance Evaluation of Semantic Based and Ontology Based Text Document Clustering Techniques
Abstract The amount of digital information is created and used is steadily growing along with the development of sophisticated hardware and software. This has increased the need for powerful algorithms that can interpret and extract interesting...
2012 / S.C. Punitha, M. Punithavalli -
A Graphical Foundation for Schedules
Abstract In 2007, Harmer, Hyland and Melliès gave a formal mathematical foundation for game semantics using a notion they called a schedule. Their definition was combinatorial in nature, but researchers often draw pictures when describing schedules...
2012 / Guy McCusker, John Power, Cai Wingfield -
Applying Epistemology to System Engineering: An Illustration
Abstract Epistemology is a branch of Philosophy where the debates focus on the nature of knowledge and ways of knowing. Epistemological questions and debates are often reflected in other disciplines having a strong relationship with knowledge, such...
2013 / Reginald Ratcliff -
Performance Evaluation of MANET Network Parameters Using AODV Protocol for HEAACK Enhancement
Abstract MANETs are Vulnerable to malicious attackers because of their open medium and wide distribution of malicious attackers. Intrusion Detection System detects and reports the malicious activity in ad hoc networks. IDSs usually act as the second ...
2016 / Parth Patel, Rajesh Bansode, Bhushan Nemade -
Online Learning Programmes for Less Widely Used and Taught Languages
Abstract Romanian language has been included in various projects dealing with LWULT (Less Widely Used and Taught Languages), alongside with other languages such as Latvian, Gaelic, Basque or Turkish. Such projects promote and disseminate tools and...
2013 / Aurora – Tatiana Dina, Silvia Ciornei -
Energy-aware Peering Routing Protocol for indoor hospital Body Area Network Communication
Abstract The recent research in Body Area Networks (BAN) is focused on making its communication more reliable, energy efficient, secure, and to better utilize system resources. In this paper we propose a novel BAN network architecture for indoor...
2012 / Zahoor Khan, Nauman Aslam, Shyamala Sivakumar, William Phillips -
Efficiency of simulation in monotone hyper-stable queueing networks2013 / Jonatha Anselmi, Bruno Gaujal
-
Equational Coalgebraic Logic
Abstract Coalgebra develops a general theory of transition systems, parametric in a functor T; the functor T specifies the possible one-step behaviours of the system. A fundamental question in this area is how to obtain, for an arbitrary functor T,...
2009 / Alexander Kurz, Raul Leal -
CTL-Property Transformations Along an Incremental Design Process
Abstract This paper formalizes an incremental approach to design flow-control oriented hardware devices described by Moore machines. The method is based on successive additions of new behaviors to a simple device in order to build a more complex...
2005 / Cécile Braunstein, Emmanuelle Encrenaz -
Towards an Intersection Typed System à la Church
Abstract In this paper, we presents a comfortable fully typed lambda calculus based on the well-known intersection type system discipline where proof are not only feasible but easy; the present system is the counterpart à la Church of the type...
2005 / Luigi Liquori, Simona Ronchi della Rocca -
Component Identification Through Program Slicing
Abstract This paper reports on the development of specific slicing techniques for functional programs and their use for the identification of possible coherent components from monolithic code. An associated tool is also introduced. This piece of...
2006 / Nuno F. Rodrigues, Luís S. Barbosa -
A Congruence Rule Format with Universal Quantification
Abstract We investigate the addition of universal quantification to the meta-theory of Structural Operational Semantics (SOS). We study the syntax and semantics of SOS rules extended with universal quantification and propose a congruence rule format ...
2007 / Mohammad Reza Mousavi, Michel Reniers