Computer and information sciences topic list of research papers
-
Second-Order Optimal Array Receivers for Synchronization of BPSK, MSK, and GMSK Signals Corrupted by Noncircular Interferences2007 / Pascal Chevalier, François Pipon, François Delaveau
-
Wireless Sensor Networking Architecture of Polytropon: An Open Source Scalable Platform for the Smart Grid
Abstract This article presents the overall design methodology followed for an open source Wireless Sensor Networking platform that aims at the remote energy monitoring of home appliances in real-time using web technologies. This platform can be a...
2014 / P. Papageorgas, D. Piromalis, T. Iliopoulou, K. Agavanakis, M. Barbarosou, et al. -
A Semantic Approach for Service Adaptation in Context-aware Environment
Abstract With pervasive computing, Service oriented architectures become more mobile and distributed and are executed in varying contexts. Context is understood as any information about the user needs and operating environment which vary dynamically ...
2014 / Hatim Guermah, Tarik Fissaa, Hatim Hafiddi, Mahmoud Nassar, Abdelaziz Kriouile -
BoRIS and BIA: CRIS and Institutional Repository Integration at the Free University of Bozen-Bolzano
Abstract This paper describes the implementation at the Free University of Bozen-Bolzano (FUB) of a Current Research Information System named BoRIS (Bozen-Bolzano Research Information System, an implementation of Avedas Converis 5 software)...
2014 / Luigi Siciliano, Sabine Schmidt, Manuel Kinzler -
Subclass Problem-Dependent Design for Error-Correcting Output Codes2008 / S. Escalera, D.M.J. Tax, O. Pujol, P. Radeva, R.P.W. Duin
-
A new discrete Fourier transform algorithm using butterfly structure fast convolution2004 / K. Nakayama
-
Smarter Smartphones: Understanding and Predicting User Habits from GPS Sensor Data
Abstract Smartphones and similar devices allow access to a wealth of information. Navigating this wealth of information is problematic. Semantic locations, assigned to observed GPS user movements, can help in providing inforamtion that is useful to...
2014 / G. Maggiore, C. Santos, A. Plaat -
Development of a Personalized e-learning Model Using Methods of Ontology
Abstract A number of recent studies are trying to improve the quality and effectiveness of e-learning using principles of several research areas. This trend of personalization development also appears in e-learning. One of the ideologically closest...
2013 / Sarma Cakula, Maija Sedleniece -
A Social Platform for Knowledge Gathering and Exploitation, Towards the Deduction of Inter-enterprise Collaborations
Abstract Several standards have been defined for enhancing the efficiency of B2B web-supported collaboration. However, they suffer from the lack of a general semantic representation, which leaves aside the promise of deducing automatically the...
2015 / Aurélie Montarnal, Tiexin Wang, Sébastien Truptil, Frédérick Bénaben, Matthieu Lauras, et al. -
Evaluating Game-based Learning Effectiveness in Higher Education
Abstract Game-based learning (GBL) has been widely utilized in various domains such as the military, education, marketing and advertising. Despite its popularity, an assessment of its effectiveness as a learning or a training tool is still unclear....
2014 / Mazeyanti Mohd Ariffin, Alan Oxley, Suziah Sulaiman -
Decentralized Route Guidance Architectures with User Preferences in Urban Transportation Networks
Abstract In the last decades, the increase of traffic and the limited capacity of urban networks, has led to the development of algorithms for traffic management and route guidance. The route guidance systems may cause a well-known dilemma by...
2014 / L. Adacher, G. Oliva, F. Pascucci -
A developmental approach to robotic pointing via human–robot interaction
Abstract The ability of pointing is recognised as an essential skill of a robot in its communication and social interaction. This paper introduces a developmental learning approach to robotic pointing, by exploiting the interactions between a human...
2014 / Fei Chao, Zhengshuai Wang, Changjing Shang, Qinggang Meng, Min Jiang, et al. -
On a Serendipity-oriented Recommender System based on Folksonomy and its Evaluation
Abstract The present paper proposes a recommendation method that focuses not only on predictive accuracy but also serendipity. In many of the conventional recommendation methods, items are categorized according to their attributes (genre, author,...
2013 / Hisaaki Yamaba, Michihito Tanoue, Kayoko Takatsuka, Naonobu Okazaki, Shigeyuki Tomita -
Another Piece of Evidence for Processing-based Accounts of Agrammatism2013 / A. Munarriz
-
Editor for Creating and Applying Computerise Surveys
Abstract The parallel development of the psychometric assessments and the computer technologies determined a big revolution regarding the construction and the application of psychological and educational tests. This report describes a computerized...
2014 / Humberto Blanco, Martha Ornelas, José Leandro Tristán, Armando Cocca, Daniel Mayorga-Vega, et al. -
On a Method for Improving Impulsive Sounds Localization in Hearing Defenders2008 / Benny Sällberg, Farook Sattar, Ingvar Claesson
-
Modal Predicates and Coequations
Abstract We show how coalgebras can be presented by operations and equations. This is a special case of Linton's approach to algebras over a general base category X , namely where ...
2004 / Alexander Kurz, Jiří Rosický -
Study on QOS Routing in Network Centric Warfare
Abstract The concept of network centric warfare (NCW) and the distributed equal-node network architecture in NCW are introduced in this paper. The data flow requirement model in NCW is presented. Based on synthetic analysis of network resource, the...
2011 / Yong-sheng LIANG, Nai-tong ZHANG -
Preface
Abstract The Fourth International Workshop on Rewriting logic and Its Applications (WRLA2002) was held in Pisa, Italy on September 19-21, 2002. Rewriting logic (RL) is a natural model of computation and an expressive semantic...
2005 / Fabio Gadducci, Ugo Montanari -
A Secret-Sharing Protocol Modelled in Maude
Abstract Meta-objects are used to factor the specification of the first asynchronous, proactive, secret-sharing protocol into secret-sharing, replication and encryption layers. A search strategy is described that exploits the structure of the...
2005 / Dilia E. Rodríguez