Computer and information sciences topic list of research papers
-
Application of Queueing Network Models in the Performance Evaluation of Database Designs
Abstract In this paper, we model database designs using queueing networks, giving visibility to the dynamic behaviour of the database design and allowing the database designer to experiment with different design decisions. Our approach is to...
2009 / Rasha Osman, Irfan Awan, Michael E. Woodward -
Formalizing and Analyzing the Needham-Schroeder Symmetric-Key Protocol by Rewriting
Abstract This paper reports on work in progress on using rewriting techniques for the specification and the verification of communication protocols. As in Genet and Klay's approach to formalizing protocols, a rewrite system ...
2005 / Monica Nesi, Giuseppina Rucci -
Adaptive Verification using Forced Simulation
Abstract Simulation (a pre-order) over Kripke structures is a well known formal verification technique. Simulation guarantees that all behaviours of an abstracted structure (a property or function, F) are contained in a larger structure (a model M). ...
2005 / Roopak Sinha, Partha S. Roop, Bakhadyr Khoussainov -
λ-calculus and Quantitative Program Analysis
Abstract In this paper we show how the framework of probabilistic abstract interpretation can be applied to statically analyse a probabilistic λ-calculus. We start by reviewing the classical framework of abstract interpretation. We choose to use...
2005 / Chris Hankin, Herbert Wiklicky -
Efficient Reductants Calculi using Partial Evaluation Techniques with Thresholding
Abstract Reductants are a useful theoretical tool introduced for proving correctness properties in the context of generalized annotated logic programming. This concept was adapted to the more recent and flexible framework of...
2007 / Pascual Julián, Ginés Moreno, Jaime Penabad -
Emergent Properties Do Not Refine
Abstract Refinement is conventionally used to effect a demonstrably-correct development from an abstract specification. Emergent systems present an interesting challenge in terms of demonstrably-correct development, because there is a discontinuity...
2005 / Fiona Polack, Susan Stepney -
Preface2006 / Horatiu Cirstea, Narciso Martí-Oliet
-
New Algorithms for Solving Simple Stochastic Games
Abstract We present new algorithms for determining optimal strategies for two-player games with proba- bilistic moves and reachability winning conditions. Such games, known as simple stochastic games, were extensively studied by A.Condon [Anne...
2005 / Rafał Somla -
Towards a Notion of Transaction in Graph Rewriting
Abstract We define transactional graph transformation systems (t-gtss), a mild extension of the ordinary framework for the double-pushout approach to graph transformation, which allows to model transactional activities. Generalising the work on...
2008 / P. Baldan, A. Corradini, F.L. Dotti, L. Foss, F. Gadducci, et al. -
Framework for Simulation of Heterogeneous MpSoC for Design Space Exploration2013 / Bisrat Tafesse, Venkatesan Muthukumar
-
The Application of Computer-Aided Audit for Tax Collection and Management
Abstract Carring out audit of the quality of tax collection and management is of great significance to reveal the problems existing in the tax collection and management of tax authorities and promote their tax governance according to law. The paper...
2012 / Rong Liu -
Estimation of Initial Functions for System with Delays Based on Adjoint Sensitivity Analysis
Abstract The work presents a gradient-based approach to estimation of initial functions of time delay elements appearing in models of dynamical systems. It is shown how to generate a gradient of the estimation quality index in the initial function...
2016 / Krzysztof Fujarewicz -
Mobile End-Node Location Tracking and Prediction
This article has been retracted: please see Elsevier Policy on Article Withdrawal (http://www.elsevier.com/locate/withdrawalpolicy). This article has been retracted at the request of the Infringed Authors. The authors have...
2012 / B.C. Manjith, C.S. Shijin -
Dual Steganography Approach for Secure Data Communication
Abstract In present day to day life, effective data hiding methods are needed due to attack made on data communication. This paper presents the technique for the above requirement. In this proposed method, secret message in form of audio file is...
2012 / K. Sakthisudhan, P. Prabhu, P. Thangaraj, C.M. Marimuthu -
Haptic Rendering of Virtual Shapes with the Novint Falcon
Abstract This paper evaluates the usability of the Novint Falcon for displaying virtual shapes that users can explore actively. Three experiments were conducted to measure the ease with which users can recognize and explore a set of seven haptic...
2012 / José-Luis Rodríguez, Ramiro Velàzquez -
Efficient Statistical Clustering Techniques for Optimizing Cluster Size in Wireless Sensor Network
Abstract Mobility of sensor node in Wireless Sensor Network (WSN) is one of the key advantages of wireless over fixed communication system. In heterogeneous system, generally power consumption is more then homogeneous system. The information or data ...
2012 / Raju Dutta, Shishir Gupta, Mukul K. Das -
Thinned Concentric Circular Antenna Array Synthesis using Particle Swarm Optimization
Abstract This paper presents an optimal thinning of a large multiple concentric circular ring arrays of uniformly excited isotropic antennas based on Particle Swarm Optimization method. Circular Antenna Array (CAA) has gained immense popularity in...
2012 / D. Mandal, H. Kumar, S.P. Ghoshal, R. Kar -
Lexical Semantic based Bayesian Model for Adaptive Wrapper Generation
Abstract This paper focuses on an unsupervised information extraction system. Two kinds of features related to the text fragments from the Web documents are investigated. The first type of feature is called, a site-invariant feature. The second type ...
2012 / R. Nandhi kesavan, K. Latha -
The Alignment Template Approach to Statistical Machine Translation2004 / Franz Josef Och, Hermann Ney
-
Rigid-CLL: Avoiding constant-distance computations in cell linked-lists algorithms2011 / V. Ruiz de Angulo, J. Cortés, J. M. Porta