Computer and information sciences topic list of research papers
-
Digital filter implementation over FPGA platform with LINUX OS
Abstract The embedded processors on FPGA's are a good tool to specific propose works. In this work we present how the FPGA is used to apply a Sobel filter to a set of images, also the step needed to set-up the entire system is described. An embedded ...
2012 / Jorge I. Galvan-Tejada, Carlos E. Galvan T, Jose M. Celaya-Padilla, J. Ruben Delgado C -
Termination Criteria for DPO Transformations with Injective Matches
Abstract Reasoning about graph and model transformation systems is an important means to underpin model-driven software engineering, such as Model-Driven Architecture (MDA) and Model Integrated Computing (MIC). Termination criteria for graph and...
2007 / Tihamér Levendovszky, Ulrike Prange, Hartmut Ehrig -
A Modal Logic for π-Calculus and Model Checking Algorithm
Abstract The π-calculus is one of the most important mobile process calculi and has been well studied in the literatures. Temporal logic is thought as a good compromise between description convenience and abstraction and can support useful...
2005 / Taolue Chen, Tingting Han, Jian Lu -
Combining SAT Methods with Non-Clausal Decision Heuristics
Abstract A decision procedure for arbitrary first-order formulas can be viewed as combining a propositional search with a decision procedure for conjunctions of first-order literals, so Boolean SAT methods can be used for the propositional search in ...
2005 / Clark Barrett, Jacob Donham -
An Observational Model for Spatial Logics
Abstract Spatiality is an important aspect of distributed systems because their computations depend both on the dynamic behaviour and on the structure of their components. Spatial logics have been proposed as the formal device for expressing spatial ...
2005 / Emilio Tuosto, Hugo Torres Vieira -
CoLoSS: The Coalgebraic Logic Satisfiability Solver
Abstract CoLoSS, the Coalgebraic Logic Satisfiability Solver, decides satisfiability of modal formulas in a generic and compositional way. It implements a uniform polynomial space algorithm to decide satisfiability for modal logics that are amenable ...
2009 / Georgel Calin, Rob Myers, Dirk Pattinson, Lutz Schröder -
Relational Parametricity for Control Considered as a Computational Effect
Abstract This paper investigates parametric polymorphism in the presence of control operators. Our approach is to specialise a general type theory combining polymorphism and computational effects, by extending it with additional constants expressing ...
2007 / Rasmus Ejlers Møgelberg, Alex Simpson -
Reconstruction of Partial Orders and List Representation as Random Structures
Abstract MOQA is a new programming language with the unique property that the average running time of its programs can be (semi-)automatically deduced in a modular way by a static...
2009 / Thierry Vallée, Joseph Manning -
Java Test Driver Generation from Object-Oriented Interaction Traces
Abstract In the context of test-driven development for object-oriented programs, mock objects are increasingly used for unit testing. Several Java mock object frameworks exist, which all have in common that mock objects, realizing the test...
2009 / Frank S. de Boer, Marcello B. Bonsangue, Andreas Grüner, Martin Steffen -
Towards a Small Model Theorem for Data Independent Systems in Alloy
Abstract Alloy is an extension of first-order logic for modelling software systems. Alloy has a fully automatic analyser which attempts to refute Alloy formulae by searching for counterexamples within a finite scope. However, failure to find a...
2005 / Lee Momtahan -
From Error to Error: Logic Debugging in the Many-Core Era
Abstract Design and manufacturing of present day Multi-Core microprocessors has to overcome major technology obstacles, particularly in the areas of Power and Validation. More specifically, the state of the Art in the area of validation is such that ...
2007 / John Moondanos -
Analysing the Robustness of Surfing Circuits
Abstract Surfing is a technique for implementing high-speed digital pipelines that exploits the analog dynamics of the underlying circuits. Thus, verification must consider the analog behaviour of the design. We have presented a method for analysing ...
2006 / Suwen Yang, Mark R. Greenstreet -
Compositional System Security with Interface-Confined Adversaries
Abstract This paper presents a formal framework for compositional reasoning about secure systems. A key insight is to view a trusted system in terms of the interfaces that the various components expose: larger trusted components are built by...
2010 / Deepak Garg, Jason Franklin, Dilsun Kaynar, Anupam Datta -
Transformation for Refining Unraveled Conditional Term Rewriting Systems
Abstract Unravelings, transformations from conditional term rewriting systems (CTRSs, for short) into unconditional term rewriting systems, are valuable for analyzing properties of CTRSs. In order to completely simulate rewrite sequences of CTRSs,...
2007 / Naoki Nishida, Tomohiro Mizutani, Masahiko Sakai -
Long range dipolar field calculation using hybrid parallelism
Abstract Calculating the dipolar fields in LLG simulations account for the majority of the runtime as these computations scale with system size faster than the other interactions. Efficient parallelization of the dipolar field is essential for a...
2010 / Jason Mercer -
New chaff point based fuzzy vault for multimodal biometric cryptosystem using particle swarm optimization
Abstract An effective fusion method for combining information from single modality system requires Multimodal biometric crypto system. Fuzzy vault has been widely used for providing security, but the disadvantage is that the biometric data are...
2015 / Gandhimathi Amirthalingam, G. Radhamani -
Camera Calibration Based on Perspective Geometry and Its Application in LDWS
Abstract In this paper, we present a novel algorithm to calibrate cameras for lane departure warning system(LDWS). The algorithm only need a set of parallel lane markings and parallel lines perpendicular to the ground plane to determine the camera...
2012 / Huarong Xu, Xiaodong Wang -
Supervised Semantic Image Annotation Using Region Relevance
Abstract Automatic image annotation is the key to semantic-based image retrieval. In this paper we formulate image annotation as a multi-class classification problem, which deals with the weak annotation problem and works with image-level ground...
2012 / Fei Shi, Fangfang Yang, Jiajun Wang -
Data Management Trust System in Pervasive Environments
Abstract In this paper we discuss related work from literature in security and distributed data management in general, and mobile security and peer-to-peer collaborative processes in specific. Significant work has been done to address security for...
2012 / Hu Zhao, Sangen Wang -
Intrusion Detection System Based on SVM for WLAN
Abstract Intrusion detection is a problem of great significance to protecting information systems security, especially in view of the worldwide increasing incidents of cyber-attacks. This paper focus on improving intrusion system in wireless local...
2012 / Muamer N. Mohammed, Norrozila Sulaiman