Computer and information sciences topic list of research papers
-
Performance of Low Density Parity Check Codes as a Function of Actual and Assumed Noise Levels
Abstract We investigate how sensitive Gallager's codes are, when decoded by the sum-product algorithm, to the assumed noise level. We have found a remarkably simple function that fits the empirical results as a function of the actual noise level at...
2004 / David J.C. MacKay, Christopher P. Hesketh -
Design of a Mobile Robot Controller using Esterel Tools
Abstract Robot controllers are often programmed using either standard sequential programming languages or a robot-specific language, which are then compiled to assembly language specific to the robot. Modern real-time programming languages, on the...
2005 / Arcot Sowmya, David Tsz-Wang So, Wan Hung Tang -
Chapter 6: The Compact Dynamic Bus Station
Abstract This document is one of the parts of the electronic version of the PhD thesis by S.F.M. van Vlijmen [8]. The goal of the PhD project was to get a better understanding of the problems with the integration of formal specification technique in ...
2005 / S.F.M. van Vlijmen, A.S. Klusener, A. Schrijver -
Compressed and Distributed File Formats for Labeled Transition Systems
Abstract With model checking techniques growing towards maturity, the availability for standardised file formats for labeled transition systems is more important than ever. A number of requirements for file formats are introduced, based on...
2005 / Stefan Blom, Izak van Langevelde, Bert Lisser -
Preface
Abstract This volume contains the proceedings of the First International Workshop on Probabilistic Methods in Verification (PROBMIV′98) held 19-20 June 1998 in Indianapolis, Indiana, USA, as a satellite event to the Thirteenth International IEEE...
2005 / Christel Baier, Michael Huth, Marta Kwiatkowska, Mark Ryan -
Bisimulation Trees and the Decidability of Weak Bisimulations
Abstract We develop “bisimulation trees” as a means to prove decidability of weak bisimulation for restricted classes of BPP and BPA.
2005 / Yoram Hirshfeld -
Security based Domotics
Abstract This paper provides a design and implementation of an automated control system of household appliances. Routine functions can be conveniently performed thereby saving time, energy and effort viz. switching of appliances. The proposed system ...
2014 / Rishabh Das, Sayantan Dutta, Kaushik Samanta, Anusree Sarkar, Debasis Das -
Naïve Bayes classifiers for authorship attribution of Arabic texts
Abstract Authorship attribution is the process of assigning an author to an anonymous text based on writing characteristics. Several authorship attribution methods were developed for natural languages, such as English, Chinese and Dutch. However,...
2014 / Alaa Saleh Altheneyan, Mohamed El Bachir Menai -
Assessing Time Complexity of Applications for TinyOS-Mica Wireless Sensor Networks in TOSSIM Emulator
Abstract We propose an approach to assess and profile the time complexity of an wireless sensor network application executing in the TOSSIM environment since TOSSIM lacks the built-in facilities to determine the run time for an application that is...
2012 / Gursel Serpen, Jiakai Li -
Calcium- and voltage-activated plateau currents of cardiac Purkinje fibers2004 / J. L. Kenyon
-
New Strategies and Extensions in Weighted Clustering Algorithms for Mobile Ad Hoc Networks
Abstract We study the problem of constructing a novel framework for dynamically organizing mobile nodes in wireless ad-hoc networks into clusters where it is necessary to provide robustness in the face of topological changes caused by node motion,...
2013 / Mohamed Aissa, Abdelfettah Belghith, Khalil Drira -
A New Exposed-terminal-free MAC Protocol for Multi-hop Wireless Networks
Abstract This article presents a new multichannel medium access control (MAC) protocol to solve the exposed-terminal (ET) problem for efficient channel sharing in multi-hop wireless networks. It uses request-to-send and clear-to-send (RTS/CTS)...
2009 / Liu Kai, Xing Xiaoqin -
Using Multi-agent Systems to Pursue Autonomy with Automated Components
Abstract Humans have used tools to transform raw resources into valued outputs ever since society harnessed fire. The type of tool, amount of effort and form of energy required depends on the output or object being created. As tools evolved into...
2013 / Jeffrey W. Tweedale -
Enhanced Adaptive SLA-aware Algorithms for Provisioning Shared Mesh Optical Networks
Abstract The paper deploys an adaptive provisioning algorithm to the traffic with huge volume of high priority connection requests with long holding time by proposing a novel SLA-aware mechanism over optical shared mesh networks. The contribution...
2013 / Alireza Nafarieh, Shyamala Sivakumar, William Robertson, William Phillips -
An approach for reasoning and refining non-functional requirements2010 / Nelson Souto Rosa, Paulo Roberto Freire Cunha, George Roger Ribeiro Justo
-
A Cloud-Based Internet of Things Platform for Ambient Assisted Living2014 / Javier Cubo, Adrián Nieto, Ernesto Pimentel
-
Mixed signal SIMD processor array vision chip for real-time image processing2013 / Stephen J. Carey, David R. W. Barr, Bin Wang, Alexey Lopich, Piotr Dudek
-
Personalized Security Approaches in E-banking Employing Flask Architecture over Cloud Environment
Abstract Personalized security in E-banking is an important issue for many individuals and companies that are looking for achieving the proper level of security. The cloud environment is a suitable infrastructure to implement personalized security...
2013 / Nayer A. Hamidi, G.K. Mahdi Rahimi, Alireza Nafarieh, Ali Hamidi, Bill Robertson -
Overlay networks a scalable alternative for p2p2003 / D. Doval, D. O'Mahony
-
Secure Communication Setup for a P2P-Based JXTA-Overlay Platform2010 / Joan Arnedo-Moreno, Keita Matsuo, Leonard Barolli, Fatos Xhafa