Computer and information sciences topic list of research papers
-
Bloom Filter Supporting Distributed Policy-Based Management in Wireless Sensor Networks
Abstract Wireless Sensor Networks (WSN) are particularly special due to many characteristics, such as a working environment that makes maintenance and support a challenge; and hardware resources, particularly memory, processing and battery power,...
2013 / Nidal Qwasmi, Ramiro Liscano -
Automated evaluation of approximate matching algorithms on real data
Abstract Bytewise approximate matching is a relatively new area within digital forensics, but its importance is growing quickly as practitioners are looking for fast methods to screen and analyze the increasing amounts of data...
2014 / Frank Breitinger, Vassil Roussev -
Simulating Heterogeneous and Larger-Scale Wireless Sensor Networks with TOSSIM TinyOS Emulator
Abstract TOSSIM is a wireless sensor network (WSN) emulator which is useful for assessing and evaluating application code in TinyOS operating system and Mica mote based environments. Although TOSSIM provides a high-fidelity and very accurate...
2012 / Jiakai Li, Gursel Serpen -
CaptchAll: An Improvement on the Modern Text-based CAPTCHA
Abstract Current CAPTCHA implementations are a source of frustration for many and yet they are an integral and necessary piece of the World Wide Web, as we know it. This paper intends to propose a solution to this ever-growing problem, CaptchAll, an ...
2013 / Charlie Obimbo, Andrew Halligan, Patrick De Freitas -
Fast Authoring for Mobile Gamebased City Tours
Abstract Tourists want to tell other people about their journeys and adventures. This is often done via social networks and digital photos. But what if one could tell other people about a great tour by sharing the tour itself with others than just...
2013 / Dominik Grüntjens, Stephan Groß, Daniel Arndt, Stefan Müller -
Group Usability Testing of Virtual Reality-based Learning Environments: A Modified Approach
Abstract Conventional usability testing is usually conducted with several individual participants. In recent years, however, group usability testing is gradually gaining attention. Such approach involves several-to-many participants performing tasks ...
2013 / Chwen Jen Chen, Siew Yung Lau, Kee Man Chuah, Chee Siong Teh -
The dropout learning algorithm
Abstract Dropout is a recently introduced algorithm for training neural networks by randomly dropping units during training to prevent their co-adaptation. A mathematical analysis of some of the static and dynamic properties of dropout is provided...
2014 / Pierre Baldi, Peter Sadowski -
An Effective Method for Habitual Behavior Extraction from the Internet
Abstract Many research studies are being conducted about the analysis of human behavior using sensor devices in the real world, and a variety of information can be found all over Internet. The primary objective is to improve social behavior and...
2013 / Nobuo Suzuki, Kazuhiko Tsuda -
A New Petri Net Modeling Technique for the Performance Analysis of Discrete Event Dynamic Systems
Abstract An interesting modeling problem is the need to model one or more of the system modules without exposition to the other system modules. This modeling problem arises due to our interest in these modules or incomplete knowledge, or inherent...
2013 / Samir M. Koriem, T.E. Dabbous, W.S. El-Kilani -
Perturbation Analysis of Korean Disordered Voices according to Signal Type
Abstract In this paper, Korean pathological voices are classified into signal type 1, 2, 3, or 4 to estimate perturbation parameters. Although the perturbation analysis can be applied to only type 1 and 2 signals, we recommend that the method should ...
2013 / JiYeoun Lee, Su-hyun Kim, Jin-Hyun Park -
Color Image Steganography based on Pixel Value Modification Method Using Modulus Function
Abstract Steganography is the only answer for secure and secret communication. Existing methods in image steganography focus on increasing embedding capacity of secret data. According to existing methods, the experimental results indicate that two...
2013 / V. Nagaraj, V. Vijayalakshmi, G. Zayaraz -
Estimation of Subjects that are Distributed at a High Density from Non-pixel Information Applying NMF
Abstract We propose a method that estimates locations of subjects that has attracted crowd's attention with high accuracy from a large number of digital photographs. Recently, attempts that observe real world from a large number of data, assuming...
2013 / Yusuke Kubo, Masao Kubo, Hiroshi Sato, Akira Namatame -
RobP2P: A Robust Architecture for Resource Sharing in Mobile Peer-to-Peer Networks
Abstract Peer-to-peer (P2P) systems are constructed to provide resource sharing among interested participants (peers) in a dis- tributed and self-organized fashion. The way P2P networks are formed is critical to the overall system performance due to ...
2013 / Khalid Elgazzar, Walid Ibrahim, Sharief Oteafy, Hossam S. Hassanein -
The Markov Chain Tree Theorem in commutative semirings and the State Reduction Algorithm in commutative semifields
Abstract We extend the Markov Chain Tree Theorem to general commutative semirings, and we generalize the State Reduction Algorithm to general commutative semifields. This leads to a new universal algorithm, whose prototype is the State Reduction...
2014 / Buket Benek Gursoy, Steve Kirkland, Oliver Mason, Sergeĭ Sergeev -
A Novel Approach to Address Interoperability Concern in Cloud Computing
Abstract For the reenactment of internet and cloud technologies, interoperability is an important touchstone. Most of the consumers are analyzing the appropriateness of cloud to employ themselves for their enterprise or personalized operations....
2015 / G. Arunkumar, Neelanarayanan Venkataraman. -
Ontology-Driven Monitoring of Patient’s Vital Signs Enabling Personalized Medical Detection and Alert2014 / Anna Hristoskova, Vangelis Sakkalis, Giorgos Zacharioudakis, Manolis Tsiknakis, Filip De Turck
-
A Comparative Study of Registration Methods for RGB-D Video of Static Scenes2014 / Vicente Morell-Gimenez, Marcelo Saval-Calvo, Jorge Azorin-Lopez, Jose Garcia-Rodriguez, Miguel Cazorla, et al.
-
Fault Accommodation in Technical Systems Based on Logic-dynamic Approach
Abstract The paper is devoted to the problem of fault accommodation in nonlinear dynamic systems related to constructing the control law which provides full decoupling with respect to fault effects. Existing conditions are formulated and calculating ...
2015 / Vladimir Filaretov, Alexey Zhirabok, Alexey Shumsky, Alexander Zuev -
How to Mine Information from Each Instance to Extract anAbbreviated and Credible Logical Rule2014 / Limin Wang, Minghui Sun, Chunhong Cao
-
Predicting database workloads through mining periodic patterns in database audit trails2015 / Marcin Zimniak, Janusz R. Getta, Wolfgang Benn