Computer and information sciences topic list of research papers
-
Arguing over Goals for Negotiation: Adopting an Assumption-Based Argumentation Decision Support System2012 / Maxime Morge, Paolo Mancarella
-
A Multi-Model Stereo Similarity Function Based on Monogenic Signal Analysis in Poisson Scale Space2011 / Jinjun Li, Hong Zhao, Chengying Shi, Xiang Zhou
-
An Efficient Genetic Algorithm for Large Scale Vehicle Routing Problem Subject to Precedence Constraints
Abstract The vehicle routing problem is a combinatorial optimization and integer programming problem seeking to service a number of customers with a fleet of vehicles. Vehicle routing problem has many applications in the fields of transportation,...
2015 / Noraini Mohd Razali -
A High Parallelism Hardware Architecture Design of the H.264/AVC Integer Motion Estimation for Applications in Real-time DTTV Transmissions
Abstract The H.264/AVC is the Standard Video Format used by the SBTVD (Sistema Brasileiro de Televisão Digital), with presence in almost all the countries in South America, that allows transmissions in Full High Definition (Full HD) video quality....
2014 / José Luis Santos Lunarejo, Carlos Silva Cárdenas -
Interactively Exploring the Connection between Bidirectional Compression and Star Bicoloring
Abstract The connection between scientific computing and graph theory is detailed for a problem called bidirectional compression. This problem consists of finding a pair of seed matrices in automatic differentiation. In terms of graph theory, the...
2015 / M. Ali Rostami, H. Martin Bücker -
Make-to-XGrade for the Design and Manufacturing of Flexible, Adaptive, and Reactive Products
Abstract Today, development of physical products does not only reflect the notion of tangible objects, but rather those of individualized products with associated services; which bring more value to final customers than the pure physical objects...
2014 / Afshin Mehrsai, Bjørnar Henriksen, Carl C. Røstad, Karl A. Hribernik, Klaus-D. Thoben -
IP Traceback through modified Probabilistic Packet Marking algorithm using Chinese Remainder Theorem
Abstract Probabilistic Packet Marking algorithm suggests a methodology to identify all the participated routers of the attack path by probabilistically marking the packets. In this approach, these marked packets contain partial information regarding ...
2015 / Y. Bhavani, V. Janaki, R. Sridevi -
Intrusion Detection System Using Bagging with Partial Decision TreeBase Classifier
Abstract Intrusion Detection System has become an essential part of the computer network security. It is used to detect, identify and track the intruders in the computer network. Intrusion Detection Technology which provides highest classification...
2015 / D.P. Gaikwad, Ravindra C. Thool -
An Approach to Segmenting Initial Object Movement in Visual Sensor Networks2014 / Seok-Woo Jang, Si-Ho Cha
-
Selective Cooperative Transmission in Ad Hoc Networks with Directional Antennas2013 / Eui-Jik Kim, Sungkwan Youm
-
Congestion Control Based on Consensus in the Wireless Sensor Network2013 / Xinhao Yang, Juncheng Jia, Shukui Zhang, Ze Li
-
Towards Scalability and Data Skew Handling in GroupBy-Joins using MapReduce Model
Abstract For over a decade, MapReduce has become the leading programming model for parallel and massive processing of large volumes of data. This has been driven by the development of many frameworks such as Spark, Pig and Hive, facilitating data...
2015 / M. Al Hajj Hassan, M. Bamha -
A finite mixture latent trajectory model for modeling ultrarunners’ behavior in a 24-hour race2015 / Francesco Bartolucci, Thomas Brendan Murphy
-
A visualization and data-sharing tool for ecosystem service maps: Lessons learnt, challenges and the way forward
Abstract A plurality in methods, models, terminologies is used to assess, quantify, map and communicate ecosystem services (ES). The Thematic Working Groups on Mapping (TWG4) and Modeling ES (TWG5) of the Ecosystem Service Partnership (ESP), recent...
2015 / E.G. Drakou, N.D. Crossman, L. Willemen, B. Burkhard, I. Palomo, et al. -
Modification of Past Remarks for Activating Discussion in Collaborative Learning
Abstract In collaborative learning, a discussion sometimes comes to a standstill because no comments have been made or no conflicting opinions have been offered. Activation remarks, which might solve such situations using past discussions, may be...
2014 / Fumito Nate, Yuki Hayashi, Tomoko Kojiri -
Adaptive Testing and Performance Analysis Using Naive Bayes Classifier
Abstract The highlight of this paper is to demonstrate the concept of adaptive tests which are an efficient way to produce the desired result as compared to the traditional static tests. The algorithm learns to adapt to the user's knowledge, and...
2015 / Sanjana Agarwal, Nirav Jain, Surekha Dholay -
Real Time Biometrics Based Vehicle Security System with GPS and GSM Technology
Abstract In this current world where technology is growing up day by day and scientific researchers are presenting new era of discoveries, the need for security is also increasing in all areas. At present, the vehicle usage is basic necessity for...
2015 / N. Kiruthiga, L. latha, S. Thangasamy -
An anonymization technique using intersected decision trees
Abstract Data mining plays an important role in analyzing the massive amount of data collected in today’s world. However, due to the public’s rising awareness of privacy and lack of trust in organizations, suitable Privacy Preserving Data Mining...
2015 / Sam Fletcher, Md Zahidul Islam -
Cloning and Expanding Graph Transformation Rules for Refactoring
Abstract Refactoring is a software engineering technique that aims at enhancing the structure of object-oriented software while preserving its behavior. Several authors have studied how graph transformation can be used to specify refactoring,...
2006 / Berthold Hoffmann, Dirk Janssens, Niels Van Eetvelde -
An Iterative Projective Clustering Method
Abstract In this article we offer an algorithm recurrently divides a dataset by search of partitions via one dimensional subspace discovered by means of optimizing of a projected pursuit function. Aiming to assess the model order a resampling...
2015 / Renata Avros, Zakharia Frenkel, Dvora Toledano-Kitai, Zeev Volkovich