Computer and information sciences topic list of research papers
-
Effective Volumetric Feature Modeling and Coarse Correspondence via Improved 3DSIFT and Spectral Matching2014 / Peizhi Chen, Xin Li
-
Cryptanalysis of Loiss Stream Cipher-Revisited2014 / Lin Ding, Chenhui Jin, Jie Guan, Qiuyan Wang
-
Certificateless Public Key Encryption Scheme with Hybrid Problems and Its Application to Internet of Things2014 / Rui Guo, Qiaoyan Wen, Huixian Shi, Zhengping Jin, Hua Zhang
-
RDFScape: Semantic Web meets Systems Biology2008 / Andrea Splendiani
-
Bio-jETI: a service integration, design, and provisioning platform for orchestrated bioinformatics processes2008 / Tiziana Margaria, Christian Kubczak, Bernhard Steffen
-
Improved signal detection for two-way wireless relaying networks under imperfect time synchronisation2014 / Mohammed O El Astal, Jan Olivier
-
Single-channel dereverberation by feature mapping using cascade neural networks for robust distant speaker identification and speech recognition2014 / Aditya Nugraha, Kazumasa Yamamoto, Seiichi Nakagawa
-
Context-dependent acoustic modeling based on hidden maximum entropy model for statistical parametric speech synthesis2014 / Soheil Khorram, Hossein Sameti, Fahimeh Bahmaninezhad, Simon King, Thomas Drugman
-
AppaaS: offering mobile applications as a cloud service2013 / Khalid Elgazzar, Ali Ejaz, Hossam S Hassanein
-
Using an empirical study to evaluate the feasibility of a new usability inspection technique for paper based prototypes of web applications2013 / Luis Rivero, Tayana Conte
-
Belief manipulation and message meaning for protocol analysis2014 / Aaron Hunter
-
OSTBC transmission in MIMO AF relaying with M-FSK modulation2015 / Ha X Nguyen, Chai Truyen Thai, Nguyen N Tran
-
Neuro-fuzzy system with weighted attributes2013 / Krzysztof Simiński
-
A novel statistical approach for detection of suspicious regions in digital mammogram
Abstract In this paper, we propose a novel algorithm to detect the suspicious regions on digital mammograms that based on the Fisher information measure. The proposed algorithm is tested different types and categories of mammograms (fatty,...
2013 / Z.A. Abo-Eleneen, Gamil Abdel-Azim -
OntoFox: web-based support for ontology reuse2010 / Zuoshuang Xiang, Mélanie Courtot, Ryan R Brinkman, Alan Ruttenberg, Yongqun He
-
Bandit Detection using Color Detection Method
Abstract The issue of the actual mechanism for the visual and computational perception of motion in the human are keep grow for the last decade. Each researcher is keep pursuit to find the ideal potion of a robust recognition and detection for video ...
2012 / A.K. Junoh, N. Mansor, W.Z.A.W. Muhamad, S. Abu, W.N.W. Jaafar, et al. -
A bi-logistic growth model for conference registration with an early bird deadline2013 / Trevor Fenner, Mark Levene, George Loizou
-
Provably secure certificateless strong designated verifier signature scheme based on elliptic curve bilinear pairings
Abstract Diffie and Hellman first invented the public key cryptosystem (PKC) wherein the public key infrastructure (PKI) is used for the management of public keys; however, the PKI-based cryptosystems suffer from heavy management trouble of public...
2012 / SK Hafizul Islam, G.P. Biswas -
A Mathematical Approach on Solving Hausa Puzzles in Northern Nigeria
Abstract Hausa Puzzles is a traditional way of learning Mathematics in Northern Nigeria. The puzzles are stated verbally in form of word problems or storytelling and the listeners solve the problems through reasoning and tell the answers. However,...
2010 / M.Y Waziri, I. Saidu, H. Musa -
LEO-Ring-Based Communications Network
Abstract This paper continues the development of a concept for a low-earth-orbit-based optic-fiber-communication system that may ameliorate some limitations of present space communications systems. Starting with an assumption that a circum-terra...
2011 / A. Meulenberg, T.C. Wan