Computer and information sciences topic list of research papers
-
Information and communication technologies coordinator teachers’ evaluations of computer working environments in terms of ergonomics
Abstract The aim of this research is to determine information and communication technologies coordinator teachers’ (ICT-CTs’) evaluations of the organisation of computer working environments in terms of ergonomics. ICT-CTs have responsibility for...
2009 / Safak Bayir, Hafize Keser -
Amorphous computing: examples, mathematics and theory2013 / W. Richard Stark
-
Complex Cooperative Networks from Evolutionary Preferential Attachment2008 / Julia Poncela, Jesús Gómez-Gardeñes, Luis M. Floría, Angel Sánchez, Yamir Moreno
-
Applying Variable Coe_cient functions to Self-Organizing Feature Maps for Network Intrusion Detection on the 1999 KDD Cup Dataset
Abstract Self-Organizing Feature Maps (SOFM's) can be a valuable element in a network intrusion detection system. When classification is performed on a segment of network tra_c, the usual method for class determination is selecting the class which...
2012 / Charlie Obimbo, Matthew Jones -
BUYER POWER AND THE ‘WATERBED EFFECT’*2011 / ROMAN INDERST, TOMMASO M. VALLETTI
-
Capsules and Closures
Abstract Capsules are a clean representation of the state of a computation in higher-order programming languages with effects. Their intent is to simplify and replace the notion of closure. They naturally provide support for functional and...
2011 / Jean-Baptiste Jeannin -
Preface2011 / Erns Leiss, Rodrigo M. Santos
-
A Neural Watermark Approach
Abstract In this paper we propose the coupling of a watermarking technique for images, called least significant bit, in the multiple classes random neural network. For that, we design a training process of the watermark pattern, an embedding process ...
2011 / Jose Aguilar, Juan Anderson -
Design and Development of a Run-Time Monitor for Multi-Core Architectures in Cloud Computing2011 / Mikyung Kang, Dong-In Kang, Stephen P. Crago, Gyung-Leen Park, Junghoon Lee
-
A hybrid mutiresolution representation for fast tree modeling and rendering
Abstract We introduce a new representation for modeling and rendering plants and trees. The representation is multiresolution and can be automatically generated and rendered in an efficient way. For the trunk and branches we procedurally build a...
2010 / Javier Lluch, Emilio Camahort, Jose Luis Hidalgo, Roberto Vivo -
User pairing in cooperative wireless network coding with network performance optimization2013 / Talha Rasheed, Mohamed H Ahmed, Octavia A Dobre, Walid Jerjawi, Mohamed Saad
-
PREDICT: Privacy and Security Enhancing Dynamic Information Collection and Monitoring
Abstract In this paper, we present an overview of our ongoing project PREDICT (Privacy and secuRity Enhancing Dynamic Information Collection and moniToring). The overall aim of the project is to develop a framework with algorithms and mechanisms for ...
2013 / Li Xiong, Vaidy Sunderam, Liyue Fan, Slawomir Goryczka, Layla Pournajaf -
Lift-contractions
Abstract We introduce and study a partial order on graphs—lift-contractions. A graph H is a lift-contraction of a graph G if H ...
2013 / Petr A. Golovach, Daniël Paulusma, Marcin Kamiński, Dimitrios M. Thilikos -
Playfulness and Creativity: A Look at Language use Online in Malaysia
Abstract The emergence of the internet has created a popular avenue for discussion of various issues. One recent internet phenomenon involves the new web technologies or popularly known as social media. These new web technologies have opened up...
2013 / Zaemah Abdul Kadir, Hayati Idris, Sharifah Shahnaz Syed Husain -
Co-evolutionary automatic programming for software development
Abstract Since the 1970s the goal of generating programs in an automatic way (i.e., Automatic Programming) has been sought. A user would just define what he expects from the program (i.e., the requirements), and it should be automatically generated...
2010 / Andrea Arcuri, Xin Yao -
Implementation of Intel Restricted Transactional Memory ISA Extension in Simics
Abstract Hardware transactional memory is finally becoming available in products from major vendors. Recently Intel announced that a set of transactional synchronization extensions (TSX) will be available in its next processor microarchitecture,...
2013 / Grigory Rechistov, Arnold Plotkin -
Exploration and Reflection of the Design Models of Computerized Testing
Abstract With the development and popularization of the internet technology, Computerized or Computer-Based Testing (CBT) which help to improve the efficiency of evaluation and then to assess objectively and accurately, will gradually replace the...
2013 / Chanjuan Liu, Jiaxia Li -
Agent-based Algorithm for Spatial Distribution of Objects
Abstract In this paper we present an agent-based algorithm for the spatial distribution of objects. The algorithm is a generalization of the bubble mesh algorithm, initially created for the point insertion stage of the meshing process of the finite...
2012 / Nathan Collier, Marcin Sieniek -
Data Stolen Trojan Detection based on Network Behaviors
Abstract It is well known that data loss caused by data stolen Trojans is huge as it could upload privacy or secret data to hackers who controls it remotely. Most of current security tools monitor Trojans by scanning the signature code that is...
2013 / Yiguo Pu, Xiaojun Chen, Xu Cui, Jinqiao Shi, Li Guo, et al. -
Implementation of a Timestamping Service for SunSPOT Sensors
Abstract Recent technological advances have enabled the development of sensing platforms that include different types of sensors, and integrate several components such as memory, processor, and radio. Time synchronization is a critical service for a ...
2013 / Juan A. García Reyes, Roberto Solís Robles, Blanca E. Solís Recéndez, José G. Arceo Olague