Computer and information sciences topic list of research papers
-
Hypergraph Grammar based Linear Computational Cost Solver for Three Dimensional Grids with Point Singularities
Abstract In this paper we present a hypergraph grammar based multi-frontal solver for three dimensional grids with point singularities. We show experimentally that the computational cost of the resulting solver algorithm is linear with respect to...
2014 / Piotr Gurgul, Anna Paszyńska, Maciej Paszyński -
Argumentation Approach and Learning Methods in Intelligent Decision Support Systems in the Presence of Inconsistent Data
Abstract This paper contains a description of methods and algorithms for working with inconsistent data in intelligent decision support systems. An argumentation approach and application of rough sets for generalization problems are considered. The...
2014 / Marina Fomina, Oleg Morosin, Vadim Vagin -
A New RWLS Positioning Method Basing on Distance Information
Abstract In ultra-wideband (UWB) localization, the ranging precision will determine the localization performance directly. However not all the range measurements(RMs) have the same precision. In this paper, we propose a new weighted least...
2014 / Hong Ding, Lingling He, Linhua Zheng, Jibing Yuan, Liangjun Xiang -
DAB: Dynamic and Agile Buffer-control for Streaming Videos on Mobile Devices
Abstract This paper studies the video buffer control for streaming video data to mobile devices. We target on the design challenge when the wireless link quality is dynamic due to the the environmental factors or user mobility. We develop a Dynamic...
2014 / Ying Mao, Jiayin Wang, Bo Sheng -
OpenAIRE Guidelines for CRIS Managers: Supporting Interoperability of Open Research Information through Established Standards
Abstract OpenAIRE is the European infrastructure enabling researchers to comply with the European Union requirements for Open Access to research results. OpenAIRE collects metadata from data sources across Europe and beyond and defines...
2014 / Nikos Houssos, Brigitte Jörg, Jan Dvořák, Pedro Príncipe, Eloy Rodrigues, et al. -
Delayed system control in presence of actuator saturation
Abstract The paper is introducing a new design method for systems’ controllers with input delay and actuator saturations and focuses on how to force the system output to track a reference input not necessarily saturation-compatible. We propose a new ...
2014 / A. Mahjoub, F. Giri, N. Derbel -
Effects of Collaboration and Exercise Type on Incidental Vocabulary Learning: Evidence Against Involvement Load Hypothesis
Abstract This study examined effects of both collaboration and exercise type on learning vocabulary. Twenty seven Iranian learners of English received meaning and illustrative examples of the new target words through mini-dictionaries prepared for...
2014 / Karim Jahangiri, Iraj Abilipour -
Computation of cubical homology, cohomology, and (co)homological operations via chain contraction2014 / Paweł Pilarczyk, Pedro Real
-
A Quality-aware Federated Framework for Smart Mobile Applications in the Cloud
Abstract Mobile Cloud Computing is an active research domain to investigate the ways of achieving a federation between mobile computing and cloud computing. Whereas, Ambient Intelligence aims to teach our mobile devices how to behave smart in our...
2014 / Nayyab Zia Naqvi, Davy Preuveneers, Yolande Berbers -
Theory and Practice in Large Carpooling Problems
Abstract We address the carpooling problem as a graph-theoretic problem. If the set of drivers is known in advance, then for any car capacity, the problem is equivalent to the assignment problem in bipartite graphs. Otherwise, when we do not know in ...
2014 / Irith Ben-Arroyo Hartman, Daniel Keren, Abed Abu Dbai, Elad Cohen, Luk Knapen, et al. -
Determination of scattering center of multipath signals using geometric optics and Fresnel zone concepts
Abstract In this study, a method for determining scattering center (or center of scattering points) of a multipath is proposed, provided that the direction of arrival of the multipath is known by the receiver. The method is based on classical...
2014 / Kamil Yavuz Kapusuz, Ali Kara -
BioScape: A Modeling and Simulation Language for Bacteria-Materials Interactions
Abstract We design BioScape, a concurrent language for the stochastic simulation of biological and bio-materials processes in a reactive environment in 3D space. BioScape is based on the Stochastic Pi-Calculus, and it is motivated by the need for...
2013 / Adriana Compagnoni, Vishakha Sharma, Yifei Bao, Matthew Libera, Svetlana Sukhishvili, et al. -
Chaos based Edge Adaptive Image Steganography
Abstract Steganography is the science of hiding data into innocuous objects such that the existence of the hidden data remains imperceptible to an adversary. Steganography in images have varied techniques of implementation developed over time....
2014 / Ratnakirti Roy, Anirban Sarkar, Suvamoy Changder -
“Solutions for RFID Smart Tagged Card Security Vulnerabilities”
Abstract The use of Radio Frequency Identification (RFID) technology is seeing increasing use in all areas of industry. Companies and government agencies have implemented RFID solutions to make their inventory control systems more efficient. In the...
2013 / “Avery Williamson, Li-Shiang Tsay, Ibraheem A. Kateeb, Larry Burton” -
Certificateless aggregate signcryption: Security model and a concrete construction secure in the random oracle model
Abstract The concept of aggregate signcryption was first introduced in 2009 by Selvi et al. [Identity based aggregate signcryption schemes, Lecture Notes in Computer Science 5922 LNCS, 2009, pp. 378–397]. The aggregation process of these schemes...
2014 / Ziba Eslami, Nasrollah Pakniat -
Study on Improving Lower Limb Strength among Junior Soccer Players Aged 14
Abstract The aim of this study is to improve leg strength through specific exercises among junior soccer players using exercise ball athletics. We would like to see if the leg strength of junior 14-year old players can be improved significantly...
2014 / Stănculescu George, Melenco Ionel, Popa Cristian -
Rewriting in the partial algebra of typed terms modulo AC
Abstract We study the partial algebra of typed terms with an associative commutative and idempotent operator (typed AC-terms). The originality lies in the representation of the typing policy by a graph which has a decidable monadic theory. ...
2004 / Thomas Colcombet -
A Pragmatic Approach to Reuse in Tactical Theorem Proving
Abstract In interactive theorem proving, tactics and tacticals have been introduced to automate proof search. In this scenario, user interaction traditionally is restricted to the mode in which the user decides which tactic to apply on the...
2004 / Axel Schairer, Serge Autexier, Dieter Hutter -
Statistical Independence as Linear Independence
Abstract A contingency table summarizes the conditional frequencies of two attributes and shows how these two attributes are dependent on each other. Thus, this table is a fundamental tool for pattern discovery with conditional probabilities, such...
2004 / Shusaku Tsumoto -
A Note on Set Agreement with Omission Failures1 1This work is partially supported by the National Competence Center in Research on Mobile Information and Communication Systems (NCCR-MICS), a center supported by the Swiss National Science Foundation under grant number 5005-67322.
Abstract This paper considers the k-set agreement problem in a synchronous distributed system model with send-omission failures in which at most f processes can fail by send-omission. We show that, in a system of n+1 processes (n+1) f), no algorithm ...
2004 / Rachid Guerraoui, Petr Kouznetsov, Bastian Pochon