Computer and information sciences topic list of research papers
-
Lazy Database Access with Persistent Predicates
Abstract Programmers need mechanisms to store application specific data that persists multiple program runs. To accomplish this task, they usually have to deal with storage specific code to access files or relational databases. Functional logic...
2007 / Sebastian Fischer -
Preface2005 / John Boyland, Görel Hedin
-
Modelling Multicast QoS Routing by using Best-Tree Search in And-or Graphs and Soft Constraint Logic Programming
Abstract We suggest a formal model to represent and solve the multicast routing problem in multicast networks. To attain this, we model the network adapting it to a weighted and-or graph, where the weight on a connector corresponds to the cost of...
2007 / Stefano Bistarelli, Ugo Montanari, Francesca Rossi, Francesco Santini -
Category Theoretic Models of Data Refinement
Abstract We give an account of the use of category theory in modelling data refinement over the past twenty years. We start with Tony Hoare's formulation of data refinement in category theoretic terms, explain how the category theory may be made...
2009 / Michael Johnson, David Naumann, John Power -
A Semantics of Realisability for the Classical Propositional Natural Deduction
Abstract In this paper, we introduce a semantics of realisability for the classical propositional natural deduction and we prove a correctness theorem. This allows to characterize the operational behaviour of some typed terms. ...
2005 / Karim Nour, Khelifa Saber -
On Equivalences for a Class of Timed Regular Expressions
Abstract Timed regular expressions are an extension of regular expressions that capture a notion of time. Roughly speaking, timed regular expressions can be used to represent timed sequences of events, with new operators to control the duration of...
2004 / Riccardo Pucella -
Coordination Models Orc and Reo Compared
Abstract Orc and Reo are two complementary approaches to the problem of coordinating components or services. On one hand, Orc is highly asynchronous, naturally dynamic, and based on ephemeral connections to services. On the...
2008 / José Proença, Dave Clarke -
Complete Axiomatization for Divergent-Sensitive Bisimulations in Basic Process Algebra with Prefix Iteration
Abstract We study the divergent-sensitive spectrum of weak bisimulation equivalences in the setting of process algebra. To represent the infinite behavior, we consider the prefix iteration extension of a fragment of Milner's CCS. The prefix...
2008 / Taolue Chen, Jian Lu -
Preface2006 / Alessandro Armando, Alessandro Cimatti
-
Testing-based Process for Evaluating Component Replaceability
Abstract Replacing pieces of component-based systems carries a serious risk on the expected stability. Substitutability of components must then be carefully identified. With this intent, this paper presents a process to evaluate replacement...
2009 / Andres Flores, Macario Polo -
Virtual Interior Design Based On VRML AND JAVA
Abstract Virtual reality has been involved in a wide range of academic and commercial applications. It can give users a natural feeling of the environment by creating realistic virtual worlds. In this paper, we use vrml and java to discuss the...
2012 / Shaoliang Qi -
A Trust Model Based on Cloud Model and Bayesian Networks
Abstract the Internet has been becoming the most important infrastructure for distributed applications which are composed of online services. In such open and dynamic environment, service selection becomes a challenge. The approaches based on...
2012 / Bo Jin, Yong Wang, Zhenyan Liu, Jingfeng Xue -
Designing workshop management system supporting decision making with OODB
Abstract In this study, a workshop production management system supporting decision making is designed for use in small and medium-sized machine workshops. Small and medium sized companies’ quality, price, and delivery time issues are in a tough...
2012 / İlhami M. Orak, Beyza Yaman, Giovanna Guerrini -
A mechanical Turing machine: blueprint for a biomolecular computer2012 / E. Shapiro
-
Development of Encapsulated Class Complexity Metric
Abstract Software based system is increasing dynamically over the past decades. Safe and reliable software operation is a significant need for many types of systems. Higher complexity in the software decreases reliability of software. The paper aims ...
2012 / A. Yadav, R.A. Khan -
Improved Task Graph-based Parallel Data Processing for Dynamic Resource Allocation in Cloud
Abstract In recent years large-set parallel data processing has gained quantum as one of the predominant applications of Infrastructure-as-a-Service (IaaS) clouds. Data processing frameworks like Google's MapReduce and its open source implementation ...
2012 / A. Ajitha, D. Ramesh -
Powering Wireless Sensor Networks Nodes for Complex Protocols on Harvested Energy
Abstract The energy source is one of the main constraints in many aspects of modern life. This fact is of crucial importance when addressing portable electronic devices operation. Portable devices, which can be considered as a distinctive...
2012 / J. Pedro Amaro, Fernando J.T.E. Ferreira, Rui Cortesão, Jorge Landeck -
Home Security System Based on k–NN Classifier
Abstract In this paper we describe a home security system based on k–nn Classifier. Images were taken in uncontrolled indoor environment using video cameras of various qualities. Database contains 4,005 static images (in visible and infrared...
2012 / A.K. Junoh, M.N. Mansor, S.A. Abu, W.Z. Wan Ahmad, A.Z. Mukhtar, et al. -
Load Balancing in Cloud Computing using Stochastic Hill Climbing-A Soft Computing Approach
Abstract Cloud Computing, a new concept is a pool of virtualized computer resources. An Internet-based development where dynamically scalable and often virtualized resources are provided as a service over the Internet has become a significant issue. ...
2012 / Brototi Mondal, Kousik Dasgupta, Paramartha Dutta -
Privacy For Location Based System In Mobile P2P Environment
Abstract Advances in mobile communication,it creates a major privacy breach in current location-based services (LBS) where mobile users have to report their exact location information to an LBS provider in order to obtain their desired services. For ...
2012 / E. Michael Priya, G. Mani