Computer and information sciences topic list of research papers
-
A Graph-based Design Framework for Global Computing Systems
Abstract We present a framework for designing and analyzing Global Computing Systems using Dynamic Software Architectures. The framework, called TGG A , integrates typed graph...
2009 / Antonio Bucchiarone, Greg Dennis, Stefania Gnesi -
Structure and Properties of Traces for Functional Programs
Abstract The tracer Hat records in a detailed trace the computation of a program written in the lazy functional language Haskell. The trace can then be viewed in various ways to support program comprehension and debugging. The trace was named the...
2007 / Olaf Chitil, Yong Luo -
Type Assignement for Mobile Objects2004 / Franco Barbanera, Ugo de'Liguoro
-
Meta-programming With Built-in Type Equality
Abstract We report our experience with exploring a new point in the design space for formal reasoning systems: the development of the programming language Ωmega. Ωmega is intended as both a practical programming language and a logic. The main goal...
2008 / Tim Sheard, Emir Pasalic -
Path-based XML Relational Storage Approach
Abstract As an important medium for the description of product information and data exchange, XML(eXtensible Markup Language) is widely used in the network supported collaborative design. How to store and query XML data will directly affect the...
2012 / Qi Wang, Zhongwei Ren, Liang Dong, Zhongqi Sheng -
The Internet Cathedral, Internetization, Infostrada, and Globalization
Abstract The purpose of this investigation is to define the historic roots of the Internet and its implications in the 21st century. The interdisciplinary, civilizational methodology is applied to evaluate the evolution of the Internet. Among...
2012 / Andrew Targowski -
Entropy based Log Chromaticity Projection for Real-time Stereo Matching
Abstract Most of the existing stereo matching algorithms will assume a similar corresponding color values between stereo images. In the real scenario, these color values are effected by several radiometric factors such as illumination direction,...
2012 / U. Raghavendra, Makkithaya Krishnamoorthi, A.K. Karunakar -
Cloud Based E-Governance System: A Survey
Abstract The overwhelming success and the rapid growth of the Internet changes our lives; the way we interact, learn and work. Now a days most of the organizations including government deliver their services through internet. E–governance is the...
2012 / K.K. Smitha, Tony Thomas, K. Chitharanjan -
Object Oriented Design Complexity Quantification Model
Abstract This paper does meticulous research review of complexity quantification of object oriented software design and put forth some relevant information about complexity factors identification and its impact with object oriented design...
2012 / Suhel Ahmad Khan, Raees Ahmad Khan -
RFID based Mobile Cold Chain Management System for Warehousing
Abstract A cold chain is a temperature controlled supply chain. An unbroken cold chain is an uninterrupted series of storage and distribution activities which maintain a given temperature range. It is used to extend and ensure the shelf life of...
2012 / G. Prakash, A. Pravin Renold, B. Venkatalakshmi -
Wireless e-Nose Sensor Node: State of the Art
Abstract In recent years, there are significant growths of interest in wireless technology especially in the development of e-Nose sensor network. Several wireless e-Nose node sensor prototypes have been developed by some research institutions....
2012 / C. Bambang Dwi Kuncoro, Armansyah, Nor Hayati Saad, Ahmed Jaffar, Cheng Yee Low, et al. -
Development of Smart Wheelchair System for a User with Severe Motor Impairment
Abstract Users with severe motor impairment may find it difficult to operate a wheelchair when they are in tight space (e.g., passing doorway) or when avoiding obstacles since they cannot command the wheelchair by means of a conventional joystick....
2012 / Mohd Razali Md Tomari, Yoshinori Kobayashi, Yoshinori Kuno -
Temporal Based Approach for Face Information: A Modified Solution to AAM
Abstract To gain High efficiency, Accurate alignment and for Handling Face Deformations we use Temporal Matching Active Appearance Model (TM-AAM). The major component in judging a person's intention, personality and effective state are facial...
2012 / C. Jaiseeli, K. Naga Prasad, S. Kiran Kumar, Vootla M. Manoj, N.R. Raajan, et al. -
Characteristic μ-Calculus Formulas for Underspecified Transition Systems
Abstract Underspecification, which is essential for specification formalisms, is usually expressed by equivalences, simulations, or logic approaches. We introduce underspecified transition systems (UTSs) as general model general model for...
2005 / Harald Fecher, Martin Steffen -
Justifying Equality
Abstract We consider the problem of finding irredundant bases for inconsistent sets of equalities and disequalities. These are subsets of inconsistent sets which do not contain any literals which do not contribute to the unsatisfiability in an...
2005 / Leonardo de Moura, Harald Rueß, Natarajan Shankar -
Fujaba-Based Tool Development for eHome Systems
Abstract One of the main reasons preventing a wide application of eHome systems in practice is the effort needed to combine all appliances, necessary controller and infrastructure components to benefit from derived value-added services. The...
2005 / Ulrich Norbisrath, Priit Salumaa, Erhard Schultchen, Bodo Kraft -
Approximating Imperfect Cryptography in a Formal Model2004 / Angelo Troina, Alessandro Aldini, Roberto Gorrieri
-
Testing operational transformations in model-driven engineering2013 / Andrea Ciancone, Antonio Filieri, Raffaela Mirandola
-
An Ameliorated Methodology to Abstract Object Oriented Features from Programming System
Abstract In software testing through reverse engineering, the programming semiotics are to be transformed to Unified Modeling Language (UML) semiotics. This process needs the abstraction of UML syntactics, semantics from the programming system. As a ...
2015 / Shivanand M. Handigund, B.N. Arunakumari -
Dynamic Trust Based Method to Mitigate Greyhole Attack in Mobile Adhoc Networks
Abstract Effective mitigation against the security attacks in the mobile adhoc network is a challenging job. A new routing protocol based on the trust model is proposed and analysed in this article. Here each node calculates trust value and...
2012 / N. Bhalaji, A. Shanmugam