Computer and information sciences topic list of research papers
-
Virtual Faculty Development Using Top-down Implementation Strategy and Adapted EES Model
Abstract E-learning has become an increasingly popular learning approach in universities due to the rapid growth of web-based technologies. E-learning implementation at universities is a long-lasting and complicated process. This process has to...
2011 / Martin Drlik, Jan Skalka -
Research of the Heart Information Monitoring Robert Based on the 3G Wireless Communication Platform
Abstract Electrocardiogram (ECG) of a person can be recorded and the diagnostic results can be displayed through touching the heart information monitoring Robert. In addition, the heart rate, phonocardiogram (PCG) and the dynamic three-dimensional...
2012 / Fuli Zhang, Huazhe Yang, Gensong Li, Yang Hong, Qingzhe Hu -
Communications Solutions for Heterogeneous Systems Based on SOA
Abstract In order to address the gaps which widely used in business application architecture and problems of heterogeneous system communication, this paper provides a standardized framework of SOA, built in the application of a loose coupling...
2012 / Xianmin Wei -
An Application of Decision Tree Based on ID3
Abstract This article deals with the application of classical decision tree ID3 of the data mining in a certain site data. It constitutes a decision tree based on information gain and thus produces some useful purchasing behavior rules. It also...
2012 / Wang Xiaohu, Wang Lele, Li Nianfeng -
Dynamic, Task-Related and Demand-Driven Scene Representation2010 / Sven Rebhan, Julian Eggert
-
A Case-Based Explanation System for Black-Box Systems2005 / Conor Nugent, Pádraig Cunningham
-
Preface2006 / Jos Baeten, Iain Phillips
-
On Decidability Properties of Local Sentences
Abstract Local (first order) sentences, introduced by Ressayre, enjoy very nice decidability properties, following from some stretching theorems stating some remarkable links between the finite and the infinite model theory of these sentences [J.-P. ...
2005 / Olivier Finkel -
Efficient Reachability Graph Representation of Petri Nets With Unbounded Counters
Abstract In this paper, we define a class of Petri nets, called Petri nets with counters, that can be seen as place/transition Petri nets enriched with a vector of integer variables on which linear operations may be applied. Their semantics usually...
2009 / Franck Pommereau, Raymond Devillers, Hanna Klaudel -
Managing Trustworthiness in Component-based Embedded Systems
Abstract Component-based systems use software components to achieve their overall high-level functionality which, in turn, may be extended by initiating the download of new components. This action may detrimentally affect the system's overall...
2007 / Gabriele Lenzini, Andrew Tokmakoff, Johan Muskens -
A Formal Semantics for a Quality of Service Contract Language
Abstract Current interests in the context of system development include non-functional aspects of an application and the quality of the service (QoS) it provides. In video on demand applications, for instance, properties such as delay, bandwidth and ...
2009 / Christiano Braga, Fabricio Chalub, Alexandre Sztajnberg -
An Institutional Theory for #-Components
Abstract The # (hash) component model has been proposed to bring the advantages of a component-based perspective of software for the development of high performance computing applications, targeting computer architectures enabled for grid, cluster...
2008 / Francisco Heron de Carvalho-Junior, Rafael Dueire Lins -
Modular Verification of Interactive Systems with an Application to Biology
Abstract We propose an automata-based formalism for the description of biological systems that allows properties expressed in the universal fragment of CTL to be verified in a modular way. As an example we show the modelling of lac operon regulation ...
2010 / Peter Drábik, Andrea Maggiolo-Schettini, Paolo Milazzo -
Handshake Games
Abstract In this paper I present a game model for the semantical analysis of handshake circuits. I show how the model captures effectively the composition of circuits in an associative way. Then I build a compact-closed category of handshake games...
2007 / Luca Fossati -
Visualizing Proof Search for Theorem Prover Development
Abstract We describe an interactive visualization tool for large natural deduction proof searches. The tool permits the display of a search as it progresses, as well as the proof tree itself. We discuss the feature set and architecture of the tool,...
2009 / John Byrnes, Michael Buchanan, Michael Ernst, Philip Miller, Chris Roberts, et al. -
Multi-Clock Latency-Insensitive Architecture and Wrapper Synthesis
Abstract This paper presents an architecture and a wrapper synthesis approach for the design of multi-clock systems-on-chips. We build upon the initial work on multi-clock latency-insensitive systems by Singh and Theobald [Montek Singh and Michael...
2006 / Ankur Agiwal, Montek Singh -
Hierarchical Nominal Terms and Their Theory of Rewriting
Abstract Nominal rewriting introduced a novel method of specifying rewriting on syntax-with-binding. We extend this treatment of rewriting with hierarchy of variables representing increasingly 'meta-level' variables, e.g. in hierarchical nominal...
2007 / Murdoch J. Gabbay -
Application of Improved Adjacency Matrix Multiplication in Distribution Network Flow Calculation
Abstract Back/forward sweep flow algorithm is a optimal way used to calculate loss for distribution economic operation. Combined the unique radial characteristic of distribution network, this paper propose a back/forward sweep distribution load flow ...
2012 / Li Liu, Xuan zhao -
Investment Evaluation System Development Based on Unified Information Platform for Future Smart Grid
Abstract With the aim of strengthening the construction of smart power grid, large investment will be put into power grid of China. Investment evaluation of power grid is necessary in this situation particularly in the light of escalating costs and...
2011 / He Chen, Kai Feng, Quan Zhang, Zichen Zhao, Lin Zhang, et al. -
An Improvement of Kwon-Song Protocol
Abstract The Internet has been population, which it was implement information technology, to every enterprise, also changed their contact mode of information flow style. Since public key conception was proposed, it had authentication function to...
2012 / Mingshun Yuan, Chenglian Liu