Computer and information sciences topic list of research papers
-
Universal Boolean Systems
Abstract Boolean interaction systems and hard interaction systems define nets of interacting cells. They are based on the same local interaction principle between two cells as interaction nets but do not allow that the structure of nets may evolve....
2008 / Denis Béchet, Sylvain Lippi -
Model-based Security Testing Using UMLsec
Abstract Designing and implementing security-critical systems correctly is very difficult. In practice, most vulnerabilities arise from bugs in implementations. We present work towards systematic specification-based testing of security-critical...
2008 / Jan Jürjens -
Adaptive Application of SAT Solving Techniques
Abstract New heuristics and strategies have enabled major advancements in SAT solving in recent years. However, experimentation has shown that there is no winning solution that works in all cases. A degradation of orders of magnitude can be observed ...
2006 / Ohad Shacham, Karen Yorav -
Data Flow Analysis as a General Concept for the Transport of Verifiable Program Annotations
Abstract Just-in-Time (JIT) compilation is frequently employed in order to speed-up the execution of platform-independent and dynamically extensible mobile code applications. Since the time required for dynamic compilation directly influences a...
2007 / Wolfram Amme, Marc-André Möller, Philipp Adler -
The Interpretation of Intuitionistic Type Theory in Locally Cartesian Closed Categories – an Intuitionistic Perspective
Abstract We give an intuitionistic view of Seely's interpretation of Martin-Löf's intuitionistic type theory in locally cartesian closed categories. The idea is to use Martin-Löf type theory itself as metalanguage, and E-categories, the appropriate...
2008 / Alexandre Buisse, Peter Dybjer -
An End-To-End Approach to Distributed Policy Language Implementation
Abstract Language-based security approaches to access control and information flow control must at some point rely on a language for expressing policies. However there will in general be several choices for the correct policy language for any given...
2007 / Tom Chothia, Dominic Duggan, Ye Wu -
Performance Evaluation of Sensor Medium Access Control Protocol Using Coloured Petri Nets
Abstract Formal modeling techniques can be used for analysis of wireless sensor networks (WSNs). Coloured Petri nets (CPNs) that is an extension of Petri nets is a powerful modeling technique. In this paper, we present a CPN model for modeling and...
2009 / Mohammad Abdollahi Azgomi, Ali Khalili -
HYPE Applied to the Modelling of Hybrid Biological Systems
Abstract HYPE is a process algebra developed to model hybrid systems – systems that show both continuous and discrete behaviour. It is novel because it allows for the modelling of individual flows which means that subcomponents can be modelled in...
2008 / Vashti Galpin, Jane Hillston, Luca Bortolussi -
Methods for Proving Termination of Rewriting-based Programming Languages by Transformation
Abstract Despite the remarkable development of the theory of termination of rewriting, its application to high-level (rewriting-based) programming languages is far from being optimal. This is due to the need for features such as conditional...
2009 / Francisco Durán, Salvador Lucas, José Meseguer -
A Method of Extracting Line Spectrum of Ship's Shift-Rate Electric Field Signal
Abstract The line spectrum of shift-rate electric field is an important characteristic of ship, so it is very useful to detect the harmonics in shift-rate signal to ship's subwater detection. In this paper the forth order cumulant MUSIC method is...
2011 / Hu Yingdi, Gong Shenguang -
Appraisal and analysis on various web service composition approaches based on QoS factors
Abstract Web services are the internet enabled applications for performing business needs, considered as the platform-independent and loosely coupled. Web service compositions build new services by organizing a set of existing services by providing...
2013 / M. Rajeswari, G. Sambasivam, N. Balaji, M.S. Saleem Basha, T. Vengattaraman, et al. -
A cybersecurity model in cloud computing environments
Abstract Cloud computing is an emerging paradigm of computing that replaces computing as a personal commodity by computing as a public utility. As such, it offers all the advantages of a public utility system, in terms of economy of scale,...
2012 / Latifa Ben Arfa Rabai, Mouna Jouini, Anis Ben Aissa, Ali Mili -
A Multi-Criteria Approach for Web Service Discovery
Abstract With the growth of Web Services number and with the diversification of their types and qualities, the choice of the service that complies with user preference became a fundamental issue. The task of finding the best Web service is no longer ...
2012 / Raja Ben lakhal, Walid Chainbi -
Modular asynchronous arbiter insensitive to metastability2002 / M. Valencia, M.J. Bellido, J.L. Huertas, A.J. Acosta, S. Sanchez-Solano
-
A Signcryption based Light Weight Key Exchange Protocol
Abstract Traditional cryptography based authenticated Diffie-Hellman key exchange protocols expose the problems of efficiency and privacy since signature-then-encryption is heavy to wireless communication special for flexible dynamic deployment,...
2012 / Yong Feng, Qian Wei, Xing Zhang -
Facilitating the creation of IoT applications through conditional observations in CoAP2013 / Girum Teklemariam, Jeroen Hoebeke, Ingrid Moerman, Piet Demeester
-
On-demand routing protocols for cognitive radio ad hoc networks2013 / Shelly Salim, Sangman Moh
-
A Three-Dimensional Evaluation Model for Network Management System
Abstract The growing of network applications and the advances in network services demand for more complex and flexible network management systems. It becomes difficult to evaluate the performance of such a system using the traditional, simple and...
2013 / Fei Xu, Jinqiao Shi, Xiaojun Chen, K.P. Chow -
Improved algorithms for the K overlapping maximum convex sum problem
Abstract This paper presents efficient algorithms that improve the time complexity of the K-Overlapping Maximum Convex Sum Problem (K-OMCSP). Previous research has solved this problem by using the K-tuples approach in a time complexity of O(Kn3). In ...
2012 / Mohammed Thaher, Tadao Takaoka -
An Extended LINMAP Method for Multi-Attribute Group Decision Making under Interval-Valued Intuitionistic Fuzzy Environment
Abstract The linear programming technique for multidimensional analysis of preference (LINMAP) is one of the well-known methods for multiple attribute group decision making (MAGDM). In this paper, we extend the LINMAP method to solve MAGDM problems...
2013 / Weize Wang, Xinwang Liu