Computer and information sciences topic list of research papers
-
Spatial Calculus of Looping Sequences
Abstract The Calculus of Looping Sequences (CLS) enables the description of biological systems and of their evolution. This paper presents the Spatial CLS, an extension of CLS that allows the description of the position of biological elements, and...
2009 / Roberto Barbuti, Andrea Maggiolo–Schettini, Paolo Milazzo, Giovanni Pardini -
Modelling Generic Judgements
Abstract We propose a semantics for the ∇-quantifier of Miller and Tiu. First we consider the case for classical first-order logic. In this case, the interpretation is close to standard Tarski-semantics and completeness can be shown using a standard ...
2007 / Ulrich Schöpp -
Preface2007 / Rob van Glabbeek, Matthew Hennessy
-
Concurrent Java Test Generation as a Search Problem
Abstract A Random test generator generates executable tests together with their expected results. In the form of a noise-maker, it seeds the program with conditional scheduling primitives (such as yield()) that may cause context switches. As a...
2006 / Yaniv Eytani -
Relational Concurrent Refinement with Internal Operations
Abstract Data refinement in a state-based language such as Z is defined using a relational model in terms of the input-output behaviour of abstract programs. Downward and upward simulations form a sound and jointly complete methodology for verifying ...
2007 / John Derrick, Eerke Boiten -
An Aspect-Oriented Adaptation Framework for Dynamic Component Evolution
Abstract This paper briefly describes the design of a dynamic adaptation management framework which exploits the concepts provided by Aspect-Oriented Software Development (AOSD), in particular Aspect-Oriented Programming (AOP). The framework uses...
2007 / Javier Cámara, Carlos Canal, Javier Cubo, Juan Manuel Murillo -
Mathematical Services Composition
Abstract This paper describes the definition and the use of a plan language in the context of mathematical web services. A plan is a document intended to describe how to use different mathematical web services to solve a particular problem. A plan...
2005 / Yannis Chicha, Marc Gaëtano -
Context Sequence Matching for XML
Abstract Context and sequence variables allow matching to explore term-trees both in depth and in breadth. It makes context sequence matching a suitable computational mechanism for a rule-based language to query and transform XML, or to specify and...
2006 / Temur Kutsia -
Designing Virtual Museum Using Web3D Technology
Abstract VRT was born to have the potentiality of constructing an effective learning environment due to its 3I characteristics: Interaction, Immersion and Imagination. It is now applied in education in a more profound way along with the development...
2012 / Jianghai Zhao -
The Design of Ground Operation Control System Based on Red5 & Flex
Abstract According to the ground production of Beijing branch of China Southern Airlines, a production monitoring ground system was designed. The system is mainly used for ground monitoring of aircraft loading and production activities at the...
2012 / Zhou Guilin, Li Chunlin, Houyi -
Application of Improved SOM Neural Network in Anomaly Detection
Abstract For the false alarm rate, false negative rate, training time and other issues of SOM neural network algorithm, the author Gives an improved anomaly detection SOM algorithm---FPSOM through the introduction of the learning rate, which can...
2012 / Xueying Jiang, Kean Liu, Jiegou Yan, Wenhui Chen -
Enhancing iris recognition system performance using templates fusion
Abstract Iris recognition has very high recognition accuracy in comparison with many other biometric features. This paper proposes an iris recognition algorithm in which a set of iris images of a given eye are fused to generate a final template...
2011 / Aly I. Desoky, Hesham A. Ali, Nahla B. Abdel-Hamid -
Strategy for Mobile Map Data Interactive Balance in 3G Network
Abstract Aimed at mobile terminal's resource constraints, in order to seek a suitable balance between the validity of resource using and the complexity of implementation mechanism, the strategy for mobile map data interactive balance in 3G network...
2011 / Zhirong Chen, Tianhe Yin -
Applications of learning automata in wireless sensor networks
Abstract We are dealing with a host of challenging issues in wireless sensor networks like: limited energy supply of a sensor, which is a threat for network life time, QOS needs and energy efficient routing. Researchers have proposed a variety of...
2012 / Jalil Jabari Lotf, Mehran Hosseinzadeh, seyed hossein hosseini nazhad ghazani, Rasim M. Alguliev -
Improving Test Pattern Generation with Implication Learning
Abstract Nowadays SAT algorithms allow larger problem instances to be solved in application domains such as automatic test pattern generation (ATPG) that can also be viewed as solving a SAT problem. The key to a SAT-solver can be scalable is that it ...
2012 / Liu Xin -
Biological Inspired Inspection Underwater Robot (SNAKEY)
Abstract This paper presents the designing and development of biological inspired inspection underwater robot. Inspection and monitoring activities have been applied in this project. Two medium involve in this project development. Land has been...
2012 / Mohd Safuwan Mohd Jasni, Reza Ezuan Samin, Babul Salam Kader Ibrahim -
Hierarchy Classification for Data Warehouse: A Survey
Abstract In data warehouse systems, the hierarchies play a key role in processing and monitoring information. These hierarchies dynamically analyze huge volumes of historical data in data warehouses at various granularity levels using OLAP...
2012 / Kanika Talwar, Anjana Gosain -
Weighted Entropy-based Measure for Image Segmentation
Abstract Image segmentation is one of the fundamental and important steps that is needed to prepare an image for further processing in many computer vision applications. Over the last few decades, many image segmentation methods have been proposed,...
2012 / Weng Kin Lai, Imran M. Khan, Geong Sen Poh -
Power Flow Based Contingency Analysis Using Fuzzy LogiC
Abstract Nowadays the Stability of the power system has become very vulnerable due to frequent voltage instability. Contingency assessment has to be carried out to figure out the lines which are most vulnerable to instability. In this paper...
2012 / B. Krishnakumar, M. Subaashini, E. Ganesh Kumar, R. Arthi -
Comparative Analysis of Detection of DDoS Attacks in IEEE 802.15.4 Low Rate Wireless Personal Area Network
Abstract IEEE 802.15.4 Low rate wireless personal area networks (LR-WPANs) offer device level wireless connectivity. They bring to light a host of new applications as well as enhance existing applications. Due to their low cost, low power...
2012 / C. Balarengadurai, S. Saraswathi