Computer and information sciences topic list of research papers
-
Explicit Versus Symbolic Algorithms for Solving ALFP Constraints
Abstract ALFP, Alternation-free Least Fixed Point logic, has successfully been used as an intermediate language in the implementation of static analysis and model checking problems. Clearly different analysis problems may give rise to ALFP clauses...
2010 / Piotr Filipiuk, Hanne Riis Nielson, Flemming Nielson -
Game Semantics for Quantum Data
Abstract This paper presents a game semantics for a simply-typed λ-calculus with qbits constants and associated quantum operations. The resulting language is expressive enough to encode any quantum circuit. The language uses a notion of extended...
2011 / Yannick Delbecque -
A First Set of Design Patterns for Algorithm Animation
Abstract Design Patterns are extremely helpful in preventing programmers from “reinventing the wheel”. However, the algorithm animation area does not yet seem to have any Design Patterns, although there are several design issues that have to be...
2009 / Guido Rößling -
Towards A Game Theoretic Understanding of Ad-Hoc Routing
Abstract In this paper we present a new application of game theory, in which game theoretic techniques are used to provide a rigorous underpinning to the analysis of ad-hoc routing protocols. The explosion of interest in ad-hoc networks over the...
2005 / Irfan Zakiuddin, Tim Hawkins, Nick Moffat -
Memory Performance Characterization of SPEC CPU2006 Benchmarks Using TSIM
Abstract This paper uses TSIM, a cycle accurate architecture simulator, to characterize the memory performance of SPEC CPU2006 Benchmarks under CMP platform. The experiment covers 54 workloads with different input sets, and collects statistical...
2012 / Fucen Zeng, Lin Qiao, Mingliang Liu, Zhizhong Tang -
The inflectional morphology of Bulgarian possessive and reflexive-possessive pronouns in Universal Networking Language
Abstract The paper analyses the application of grammar knowledge representation of Bulgarian inflectional morphology. We present the implementation of inflectional morphology of Bulgarian possessive and reflexive-possessive pronouns using the...
2012 / Velislava Stoykova -
Image Classification Based on Bayes Discriminant Functions
Abstract In statistical image classification, it is usually assumed that feature observations given class labels are independently distributed [1]. Even in the case when training sample is formed by dependent feature observations, the feature...
2011 / Kestutis Ducinskas, Lijana Stabingiene, Giedrius Stabingis -
The Research on Represention and Realization of Map Symbol Based on Text
Abstract The paper put forward a descriptive rules of map symbol library on describing and organizing the point, line and area symbol with the way of plain text based on the visual variables and BNF, which can share map symbol resource cross...
2011 / Dang Li-na, Dang Gao-feng, Wu Fan -
Distributed Event Graphs: Formalizing Component-based Modelling and Simulation
Abstract In this work an extension to the classical Event Graphs formalism for discrete-event simulation is presented. The extensions are oriented towards the specification of component-based models. The abstract syntax has been defined through...
2005 / Juan de Lara -
Concurrent Nets
Abstract We introduce the calculus of concurrent nets as an extension of the fusion calculus in which usual prefixing is replaced by arbitrary monotonic guards. Then we use this formalism to describe the prefixing policy of standard calculi as a...
2005 / Emmanuel Beffara, François Maurel -
Aggressive Online Deadline Scheduling
Abstract This paper is concerned with online algorithms for scheduling jobs with deadlines on a single processor. It has been known for long that unless the system is underloaded, no online scheduling algorithm can be 1-competitive, i.e., matching...
2004 / Tak-Wah Lam, Tsuen-Wan Johnny Ngan, Kar-Keung To, Prudence Wai-Ha Wong -
Parameterized LR Parsing
Abstract Common LR parser generators lack abstraction facilities for defining recurring patterns of productions. Although there are generators capable of supporting regular expressions on the right hand side of productions, no generator supports...
2004 / Peter Thiemann, Matthias Neubauer -
Integration of Reliability and Performance Analyses for Active Network Services
Abstract Increasing the quality of software for new telecommunication services requires the joint use of different testing techniques. For instance, automatic verification and performance evaluation are necessary to ensure desired throughput and...
2005 / María del Mar Gallardo, Jesús Martínez, Pedro Merino, Guillermo Rodríguez -
RETRACTED: On the Visual Representation of Configuration in Reconfigurable Computing
Abstract This article has been retracted at the request of the Editor in Chief. Reason: it was found to have used material from other sources without proper attribution. The editors have been advised by Dr. Nathaniel Miller...
2004 / Phan C. Vinh, Jonathan P. Bowen -
Sequentiality and Piecewise-affinity in Segments of Real-PCF2004 / Amin Farjudian
-
On the Computational Strength of Pure Ambient Calculi
Abstract Cardelli and Gordon's calculus of Mobile Ambients has attracted widespread interest as a model of mobile computation. The standard calculus is quite rich, with a variety of operators, together with capabilities for entering, leaving and...
2004 / Sergio Maffeis, Iain Phillips -
Strategies in Programming Languages Today
Abstract This paper provides a brief account of motivation, themes, and research directions leading to the round table on Strategies in Programming Languages Today organized as part of the 4th International Workshop on Reduction Strategies in...
2005 / Salvador Lucas -
Two-dimensional displacement measurement using static close range photogrammetry and a single fixed camera
Abstract This work describes a simple approach to measure the displacement of a moving object in two directions simultaneously. The proposed approach is based on static close range photogrammetry with a single camera and the well-known collinearity...
2011 / Abdallah M. Khalil -
Designing and Implementing of the Linux Trusted Startup Process
Abstract Based on Linux startup actual conditions, critical files in the startup process are analyzed so as to ensure the rationality of the credibility measurement. In order to provide a method to build the trust chain and do trust measurement and...
2012 / Yaxing Long, Yichuan Wang, Shibin Zhang -
Asymmetric Watermarking Scheme Based on Shuffling
Abstract In this paper, a novel asymmetric watermarking scheme is proposed. Both the user side watermark and copyright owner's one are generated from the copyright owner's private keys, and the watermark detection can be finished either by public...
2012 / Yong-Gang Fu