Computer and information sciences topic list of research papers
-
A Smart Experience-based Knowledge Analysis System (SEKAS)
Abstract This article addresses the issues associated with using ever-increasing amounts of information and knowledge more effectively, and taking advantage of knowledge generated through experience. A hybrid structure, the Smart...
2014 / Peng Wang, Cesar Sanin, Edward Szczerbicki -
Technical Requirements of New Framework for GPRS Security Protocol Mobile Banking Application
Abstract GPRS stands out as one major development in the GSM standard that benefit from packet switched techniques to provide mobile subscribers with the much needed high bit rates for bursty data transmissions. It is possible theoretically for GPRS ...
2014 / ElBahlul ElFgee, Ahmed Arara -
The geometry of distributional preferences and a non-parametric identification approach: The Equality Equivalence Test
Abstract This paper proposes a geometric delineation of distributional preference types and a non-parametric approach for their identification in a two-person context. It starts with a small set of assumptions on preferences and shows that this set...
2015 / Rudolf Kerschbamer -
Development of a hospital mobile platform for logistics tasks
Abstract Healthcare services heavily rely on healthcare staff and subsequently, there is the need to improve healthcare staff׳s workflow. The deployment of an automated mobile base will help enhance the productivity of logistics tasks in the...
2015 / Carlos Antonio Acosta Calderon, Elara Rajesh Mohan, Buck Sin Ng -
Spléno-pancréatectomie antérograde radicale (avec vidéo)2015 / P. Pessaux, T. Piardi, D. Ntourakis, D. Mutter, J. Marescaux
-
Incremental Relay Based Cooperative Communication in Wireless Body Area Networks
Abstract Energy efficient and reliable communication is extremely crucial in most of the applications of Wireless Body Area Networks (WBANs). Communication between sensor nodes is the major energy guzzler that limits the network lifetime and hence,...
2015 / Sidrah Yousaf, Nadeem Javaid, Zahoor Ali Khan, Umar Qasim, Muhammad Imran, et al. -
Open issues in interdomain routing: a survey2005 / M. Yannuzzi, X. Masip-Bruin, O. Bonaventure
-
A Secure Implementation of a Symmetric Encryption Algorithm in White-Box Attack Contexts2013 / Yang Shi, Qin Liu, Qinpei Zhao
-
Topological Embedding Feature Based Resource Allocation in Network Virtualization2014 / Hongyan Cui, Shaohua Tang, Fangfang Sun, Yue Xu, Xiaoli Yang
-
Multihop range-free localization with approximate shortest path in anisotropic wireless sensor networks2014 / Sangwoo Lee, Chansik Park, Min Lee, Sunwoo Kim
-
A theoretical approach to optimal association control in vehicular Wi-Fi networks2014 / Jaeryong Hwang, Jaehyuk Choi, Joon Yoo, Chong-kwon Kim
-
The capacity of a class of state-dependent relay channel with orthogonal components and side information at the source and the relay2014 / Zhixiang Deng, Baoyun Wang, Fei Lang
-
Sparse coding of the modulation spectrum for noise-robust automatic speech recognition2014 / Sara Ahmadi, Seyed Ahadi, Bert Cranen, Lou Boves
-
PaaSHopper: Policy-driven middleware for multi-PaaS environments2015 / Stefan Walraven, Dimitri Landuyt, Ansar Rafique, Bert Lagaisse, Wouter Joosen
-
Virtual network security: threats, countermeasures, and challenges2015 / Leonardo Bays, Rodrigo Oliveira, Marinho Barcellos, Luciano Gaspary, Edmundo Mauro Madeira
-
Service output, innovation and productivity: A time-based conceptual framework
Abstract The paper adds to the literature on innovation and productivity in services in a three-fold way. First, it extends recent literature attempting to reconceptualise service output in terms of Lancasterian characteristics. Our focus is the...
2013 / Maria Savona, W. Edward Steinmueller -
A Comparative Analysis of Internet Banking Security in Thailand: A Customer Perspective
Abstract Internet technology has influenced everyday life during the past few decades because of its capability to assist and enhance operational and managerial performance in both non-business and business industries. Furthermore, security issues...
2012 / P. Subsorn, S. Limwiriyakul -
Palmprint Recognition Based on Curvelet Transform Decision Fusion
Abstract Curvelet transform is a multi-scale method that can represent curves most sparsely. The main feature of palmprint images is that it is made up of several main curves. This paper utilizes the curvelet transform to extract the feature...
2011 / Wang Xinchun, Yue Kaihua, Liu Yuming, Ye Qing -
The Application of Tai Chi in Sustainable Cities. The Thinking About Addicting the Virtual
Abstract The main reflections of the contradictions between virtual and reality in sustainable cities are that people Allowed the virtual life. This paper analyses and balances the contradiction between virtual and reality by Tai chi and considers...
2011 / Ye Shuanggui, Yang Jing, Zeng Hai -
Identifying Collaborative Innovation Networks
Abstract Collaborative Innovation Networks (COINS) are typically defined using individuals as nodes. Departments in organizations or higher order units can, however, be considered as forming COINs of interest. WORDij 3.0 software enables locating...
2010 / James A. Danowski