Computer and information sciences topic list of research papers
-
CellTCS:A Secure Threshold Cryptography Scheme based on Non-linear Hybrid Cellular Automata
Abstract This paper presents a secure threshold cryptography scheme, referred here as CellTCS, designed based on the features of non–linear hybrid Cellular Automata. CellTCS generates the secrets to be shared among m number of entities based on a...
2012 / Jyoti Jakhar, Pami Dey, M. Dutta, D.K. Bhattacharyya -
On-demand Evaluation for Maude
Abstract Strategy annotations provide a simple mechanism for introducing some laziness in the evaluation of expressions. As an eager programming language, Maude can take advantage of them and, in fact, they are part of the language. Maude strategy...
2005 / Francisco Durán, Santiago Escobar, Salvador Lucas -
Synchronous Estelle: Just Another Synchronous Language?2004 / Miguel Riesco, Javier Tuya
-
A non-blocking switching network and routing algorithms for on-chip networks
Abstract The on-chip interconnection network (OCIN) and routing algorithms play an important role in the performance of a chip multiprocessor (CMP). As the number of cores in CMP increases, the OCIN also should scale efficiently to make use of the...
2012 / Ajithkumar Thamarakuzhi, John A. Chandy -
The Technology Research of Dynamic Network Active Defense in Network Management
Abstract With the rapid development of network, the demanding of network security are increasingly, but the traditional network security mechanism for network attack is passive defense, which gradually become ambition in the face of various protean...
2012 / Wei-ming Hong -
The Modified Mobile Concurrent Multipath Transfer for Joint Resource Management
Abstract In the recent times, Joint Resource Management (JMR) in heterogeneous environment has emerged as an important technology wherein bandwidth allocation to a user can be provided by different networks simultaneously. This is supported by...
2012 / K.R. Kashwan, S. Karthik -
A Novel Digital Watermarking Algorithm Based on Wavelet Lifting Scheme and Linear Regression
Abstract A novel digital watermarking algorithm is proposed in this paper, which is based on Linear Regression Constrains and Wavelet Lifting Scheme. Firstly we define a fixed matrix Q and use matrix Q MOD (Modulus after Division) the low-frequency...
2012 / Li Song, Gu Qiaolun -
Irregular Rotation Deformation from Paper Scanning: An Investigation
Abstract Image acquisition has great influence on the performance of any computer vision application. Different methods can be utilized to acquire the digital image of a paper, whilst scanning scheme is among the most attractive methods. This...
2012 / Mohammad Faidzul Nasrudin, Omar M. Wahdan, Khairuddin Omar -
S3QL: A distributed domain specific language for controlled semantic integration of life sciences data2011 / Helena F Deus, Miriã C Correa, Romesh Stanislaus, Maria Miragaia, Wolfgang Maass, et al.
-
Extremal values on the eccentric distance sum of trees
Abstract Let G = ( V ...
2013 / Xianya Geng, Shuchao Li, Meng Zhang -
Multi-Core BDD Operations for Symbolic Reachability
Abstract This paper presents scalable parallel BDD operations for modern multi-core hardware. We aim at increasing the performance of reachability analysis in the context of model checking. Existing approaches focus on performing multiple...
2013 / Tom van Dijk, Alfons Laarman, Jaco van de Pol -
A Proposal to Extend the OpenMP Tasking Model with Dependent Tasks2009 / Alejandro Duran, Roger Ferrer, Eduard Ayguadé, Rosa M. Badia, Jesus Labarta
-
Neuron as a reward-modulated combinatorial switch and a model of learning behavior
Abstract This paper proposes a neuronal circuitry layout and synaptic plasticity principles that allow the (pyramidal) neuron to act as a “combinatorial switch”. Namely, the neuron learns to be more prone to generate spikes given those combinations...
2013 / Marat M. Rvachev -
Preface2009 / Matthew Hennessy, Bartek Klin
-
Higher-Order Proof Construction Based on First-Order Narrowing
Abstract We present the idea of using a proof checking algorithm for the purpose of automated proof construction. This is achieved by applying narrowing search on a proof checker expressed in a functional programming language. We focus on...
2008 / Fredrik Lindblad -
Formal Model Merging Applied to Class Diagram Integration
Abstract The integration of software artifacts is present in many scenarios of the Software Engineering field: object-oriented modeling, relational databases, XML schemas, ontologies, aspect-oriented programming, etc. In Model Management, software...
2006 / Artur Boronat, José Á. Carsí, Isidro Ramos, Patricio Letelier -
Deconstructing Alice and Bob
Abstract Alice&Bob–notation is a simple notation for describing security protocols as sequences of message exchanges. We show that, despite the fact that Alice&Bob–notation does not include explicit control flow constructs, it is possible to ...
2005 / Carlos Caleiro, Luca Viganò, David Basin -
Measuring and Evaluating Parallel State-Space Exploration Algorithms
Abstract We argue in this paper that benchmarking should be complemented by direct measurement of parallelisation overheads when evaluating parallel state-space exploration algorithms. This poses several challenges that so far have not been...
2008 / Jonathan Ezekiel, Gerald Lüttgen -
Controlling Testing Using Three-Tier Model Architecture
Abstract In this paper, based on our earlier work, we introduce test model architecture for model-based testing through a GUI. The model architecture consists of three tiers. The tiers separate important concerns in GUI testing: navigation in the...
2006 / Antti Kervinen, Mika Maunumaa, Mika Katara -
Maintaining Coherence Between Models With Distributed Rules: From Theory to Eclipse
Abstract Integrated Development Environments supporting software and model evolution have to deal with the problem of maintaining coherence between code and model despite changes which may occur on both sides. Rather than going through model...
2008 / Paolo Bottoni, Francesco Parisi-Presicce, Simone Pulcini, Gabriele Taentzer