Computer and information sciences topic list of research papers
-
Recent Advances in Real-Time Maude
Abstract This paper gives an overview of recent advances in Real-Time Maude. Real-Time Maude extends the Maude rewriting logic tool to support formal specification and analysis of object-based real-time systems. It emphasizes ease and generality of...
2007 / Peter Csaba Ölveczky, José Meseguer -
Opinion Mining of Movie Review using Hybrid Method of Support Vector Machine and Particle Swarm Optimization
Abstract Nowadays, online social media is online discourse where people contribute to create content, share it, bookmark it, and network at an impressive rate. The faster message and ease of use in social media today is Twitter. The messages on...
2013 / Abd. Samad Hasan Basari, Burairah Hussin, I. Gede Pramudya Ananta, Junta Zeniarja -
Approaches for Increasing The Similarity of Resource Schedules in Public Transport
Abstract In public bus transport, timetables usually consist of many trips that are serviced each day. However, there are also some trips that do not repeat daily. This small amount of irregular trips has a large impact when the corresponding...
2011 / Boris Amberg, Bastian Amberg, Natalia Kliewer -
On Verification of Linear Occurrence Properties of Real-Time Systems
Abstract Duration Calculus of Weakly Monotonic Time (WDC) is an extension of DC to allow description of discrete processes where several steps of computation can occur at the same time point. In this paper, we introduce Linear Occurrence Invariants...
2008 / Choe Changil, Dang Van Hung -
Using Geogebra as an information technology tool: parabola teaching
Abstract The math teaching has generally issues about paying attention and trusting ownself for learners. To solve such a critical problem, information technology, which are used in educational technologies tool, Geogebra, is used. In this study,...
2011 / Zerrin Ayvaz Reis, Sebnem Ozdemir -
A Minimum Cost of Network Hardening Model Based on Attack Graphs
Abstract In order to improve network's security, a minimum cost of network hardening model (MCNHM) based on attack graphs is presented. Firstly, the bidirectional-based search strategy is used to search the network vulnerabilities’ relationship,...
2011 / MA Jun-chun, WANG Yong-jun, SUN Ji-yin, CHEN Shan -
A Security Model Based on Information Self-feedback
Abstract Based on the intrusion of the trap theory,the data is devied into domain of inforamtion. The information basic units forms decoy honey guides as the basic elements, in accordance with the target sensitivity which comes up at the time of the ...
2011 / Huang Rongsheng, Wu renjie -
Related aspects to the impact of virtual instruments implementation in the teaching process
Abstract This paper is devoted to emphasize some aspects related with the impact of Virtual Instruments (VI) software implementation in the teaching/learning process on different topics of the Sciences area. The study was made in the frame of the...
2009 / Radu Lucian Olteanu, Crinela Dumitrescu, Gabriel Gorghiu, Laura Monica Gorghiu -
Solving the dynamic ambulance relocation and dispatching problem using approximate dynamic programming
Abstract Emergency service providers are supposed to locate ambulances such that in case of emergency patients can be reached in a time-efficient manner. Two fundamental decisions and choices need to be made real-time. First of all immediately after ...
2011 / Verena Schmid -
Practical application of chaos theory to systems engineering
Abstract Chaos Theory has been successfully applied to predict the long-term behavior of numerous biological systems using a technique known as a “Recurrence Plot”. This same method of application should prove useful in Systems Engineering as well....
2012 / David M. Curry -
A review on probabilistic graphical models in evolutionary computation2012 / Pedro Larrañaga, Hossein Karshenas, Concha Bielza, Roberto Santana
-
A Web Application Supported Learning Environment for Enhancing Classroom Teaching and Learning Experiences
Abstract Thanks to the advancement of information and communication technology (ICT), several tools and systems have been proposed to provide a quality classroom experience to instructors and students. Nevertheless, the most of them are a brand-new...
2012 / Yen-Ting Lin, Min Jou -
Readjoiner: a fast and memory efficient string graph-based sequence assembler2012 / Giorgio Gonnella, Stefan Kurtz
-
On label dependence and loss minimization in multi-label classification2012 / Krzysztof Dembczyński, Willem Waegeman, Weiwei Cheng, Eyke Hüllermeier
-
Meta-Mender: A meta-rule based recommendation system for educational applications
Abstract Recommenders are central in current applications to help the user find useful information spread in large amounts of data. Most Recommenders are more effective when huge amounts of user data are available in order to calculate user...
2010 / Vicente Arturo Romero Zaldivar, Daniel Burgos -
TEAM Network: Building Web-based Data Access and Analysis Environments for Ecosystem Services
Abstract A team of ecologists, computer scientists, and engineers from Conservation International (CI) and San Diego Supercomputer Center at the University of California San Diego (SDSC, UCSD) has been collaborating over the past 3 years to develop...
2011 / Choonhan Youn, Sandeep Chandra, Eric H. Fegraus, Kai Lin, Chaitan Baru -
A description logics formalization for the ontology matching
Abstract In this paper, we propose a new solution to the ontology matching problem. The deduction of the relations among the semantic entities is done by aggregating or composing the relations between their subsumers, which are already deduced by...
2011 / Manel Kolli, Zizette Boufaida -
Discriminative speaker adaptation in Persian continuous speech recognition systems
Abstract In this paper, the use of discriminative criteria such as minimum phone error (MPE) and maximum mutual information (MMI) is investigated for discriminative training HMM models for Persian speech recognition system. Discriminative training...
2012 / Shadi Pirhosseinloo, Farshad Almas Ganj -
An empirical study on SAJQ (Sorting Algorithm for Join Queries)
Abstract Most queries that applied on database management systems (DBMS) depend heavily on the performance of the used sorting algorithm. In addition to have an efficient sorting algorithm, as a primary feature, stability of such algorithms is a...
2010 / Hassan I. Mathkour -
A Continuous Re-Authentication Approach Using Ensemble Learning
Abstract Insider threat becomes a more and more serious problem to organizations. Identify theft is a common attack method among various attack methods from insider. And it is very hard to detection since the attacker acts as a legal identity....
2013 / Chen Xiaojun, Wei Zicheng, Pu Yiguo, Shi Jinqiao