Computer and information sciences topic list of research papers
-
A categorical approach to unification of generalised terms1 1This work has been developed as a cooperation organised within COST 274.
Abstract Unification of generalised terms in a many-valued setting involves considerations for equalities in the sense of similarity degrees between operators and thus similarities between terms. Further, allowing for substitutions of variables with ...
2004 / P. Eklund, M.A. Galán, J. Medina, M. Ojeda-Aciego, A. Valverde -
AGG and GENGED: Graph Transformation-Based Specification and Analysis Techniques for Visual Languages
Abstract The GENGED concepts and environment allow for the visual definition of visual languages (VLs) and to generate VL-specific visual environments for editing and simulation. The editing features capture either syntax-directed editing and/or...
2005 / R. Bardohl, C. Ermel, I. Weinhold -
Non-functional Oriented Dynamic Integration Of Distributed Components
Abstract Building distributed systems from scratch is known as one of the most difficult and time consuming process in software engineering. A great deal of progress has been made in the development of middleware and techniques to facilitate the...
2005 / Ahmed Saleh, George R.R. Justo, Stephen C. Winter -
A System for Automatically Generating Documentation for (C)LP Programs
Abstract We describe lpdoc, a tool which generates documentation manuals automatically from one or more logic program source files, written in ISO-Prolog, Ciao, and other (C)LP languages. It is particularly useful for documenting library modules,...
2005 / Manuel Hermenegildo -
A modified scout bee for artificial bee colony algorithm and its performance on optimization problems
Abstract The artificial bee colony (ABC) is one of the swarm intelligence algorithms used to solve optimization problems which is inspired by the foraging behaviour of the honey bees. In this paper, artificial bee colony with the rate of change...
2016 / Syahid Anuar, Ali Selamat, Roselina Sallehuddin -
Performance Evaluation of Data Delivery Mechanism For Cognitive Radio Vehicular and Vehicular Ad-Hoc Networks
Abstract Recently, the Vehicular Networks are gaining increased attention for generating extensive wireless communication. They are also integrated with Cognitive Radio to further enhance their performance. However the guaranteed delivery of data is ...
2015 / Deepanshu Garg, Rasmeet Singh Bali, Akwinder Kaur -
Collecting and Analyzing Data from Distributed Control Programs
Abstract This paper describes a set of tools that allows a developer to instrument a C/C++ program to log data at run-time and then analyze that data to verify correct behavior. The logging tools provide the developer with a means to log a variety...
2004 / David Kortenkamp, Tod Milam, Reid Simmons, Joaquin Lopez Fernandez -
Predicate Abstraction for Dense Real-Time Systems1 1This research was supported by the National Science Foundation under grants CCR-00-82560 and CCR-00-86096 and by NASA Langley Research Center under contract B09060051 and Cooperative Agreement NCC-1-399 with Honeywell Minneapolis. Most of this research has been conducted while the first author was visiting SRI International, July/August 2001.
Abstract We propose predicate abstraction as a means for verifying a rich class of safety and liveness properties for dense real-time systems. First, we define a restricted semantics of timed systems which is observationally equivalent to the...
2004 / M.Oliver Möller, Harald Rueß, Maria Sorea -
Automatic Termination Analysis of Programs Containing Arithmetic Predicates
Abstract For logic programs with arithmetic predicates, showing termination is not easy, since the usual order for the integers is not well-founded. A new method, easily incorporated in the TermiLog system for automatic termination analysis, is...
2004 / Nachum Dershowitz, Naomi Lindenstrauss, Yehoshua Sagiv, Alexander Serebrenik -
Verifying the Abstraction Level of Structural Models
Abstract Structural modeling is one of the concepts in systems engineering to handle the complexity of technical products. In the process of modeling the choice of the abstraction level and the grade of detail are afflicted with uncertainties....
2014 / Michael Roth, Daniel Kasperek, Udo Lindemann -
A Decision Model for Insurance Advisors: A Case Study
Abstract This study presents a decision model using fuzzy inference system (FIS) for insurance advisors to identify and suggest appropriate policies to potential or existing clients which can minimize the subjective prejudice of the insurance...
2014 / Siti Fatimah Abdul Razak, Shing Chiang Tan, Way-Soong Lim -
Access-Based Localization for Octagons
Abstract Access-based localization is a two-step process. First, the set of abstract memory locations that are accessed in a procedure are determined. Then, in a subsequent fixed point iteration, the input to the respective procedure is reduced to...
2012 / Eva Beckschulze, Stefan Kowalewski, Jörg Brauer -
Viable System Model for Manufacturing Execution Systems
Abstract The complexity of automated production systems results in a variety of different objectives that have to be considered in the ramp- up phase. In regard to planning and control of production processes the underlying optimization problem is...
2013 / Christian Brecher, Simon Müller, Thomas Breitbach, Wolfram Lohse -
Activating Resources and its Use in e-learning
Abstract Education has been always linked with the human kind and it has been undergoing continual development and gradual innovative processes. E-learning became a phenomenon of the second half of 20th century and the beginning of 21st century; it...
2014 / Jiří Dostál, Milan Klement, Čestmír Serafín -
ReVeaLD: A user-driven domain-specific interactive search platform for biomedical research
Abstract Bioinformatics research relies heavily on the ability to discover and correlate data from various sources. The specialization of life sciences over the past decade, coupled with an increasing number of biomedical datasets available through...
2013 / Maulik R. Kamdar, Dimitris Zeginis, Ali Hasnain, Stefan Decker, Helena F. Deus -
Security Testing Methodology for Vulnerabilities Detection of XSS in Web Services and WS-Security
Abstract Due to its distributed and open nature, Web Services give rise to new security challenges. This technology is susceptible to Cross-site Scripting (XSS) attack, which takes advantage of existing vulnerabilities. The proposed approach makes...
2014 / M.I.P. Salas, E. Martins -
New Cheating Methods in the Electronic Teaching Era
Abstract With the rise of new examination methods and tools, new cheating methods have been born. In the recent years information technology has been constantly improving its support for teachers with different kind of tools. These tools help...
2013 / Balázs Keresztury, László Cser -
Associative Memories and Processors: The Exact Match Paradigm
Abstract Associative or content addressable memories (CAM) are crucial in the implementation of high performance computing architectures for applications that require intensive data management or are cognitive in nature. The basic architecture of...
2013 / Sateh M. Jalaleddine -
A Fast Distributed Focused-web Crawling
Abstract Mining data from a web database becomes more challenging in recent years due to the exploding size of data, the rising of dynamic web, and the increasing performance of web security. Mining data from a web database differs from mining data...
2014 / Harry T. Yani Achsan, Wahyu Catur Wibowo -
The Object Relation and the Therapeutic Approach in Autism
Abstract The present article describes a therapeutic approach of a child aged 9 years, neurological treated (hydrocephalus and spine bifida) and with accentuated notes of autism. The therapeutic approach's objectives were the harmonization of the...
2014 / Mariana Popa