Computer and information sciences topic list of research papers
-
How Wireless Sensor Networks Can Benefit from Brain Emotional Learning Based Intelligent Controller (BELBIC)
Abstract Wireless sensor networks (WSNs) are composed of small sensing and actuating devices that collaboratively monitor a phenomena, process and reason about sensor measurements, and provide adequate feedback or take actions. One of WSNs tasks is...
2011 / Tahir Emre Kalayci, Majid Bahrepour, Nirvana Meratnia, Paul J.M. Havinga -
A Distributed Architecture for Micro Context-Aware Agents
Abstract Open intelligent space is a space where mobile Agents can move in an unconstrained physical manner. While such a space enables a wide range of contextual applications that address the needs of mobile users, it introduces a new set of issues ...
2011 / Patrice Roy, Bessam Abdulrazak, Yacine Belala -
Methodological Bridges for Multi-Level Systems2011 / Emanuela Merelli, Nicola Paoletti, Pietro Liò
-
A Game Map Complexity Measure Based on Hamming Distance
Abstract With the booming of PC game market, Game AI has attracted more and more researches. The interesting and difficulty of a game are relative with the map used in game scenarios. Besides, the path-finding efficiency in a game is also impacted...
2011 / Yan Li, Pan Su, Wenliang Li -
A Graph Summarization Algorithm Based on RFID Logistics
Abstract Radio Frequency Identification (RFID) applications are set to play an essential role in object tracking and supply chain management systems. The volume of data generated by a typical RFID application will be enormous as each item will...
2012 / Yan Sun, Kongfa Hu, Zhipeng Lu, Li Zhao, Ling Chen -
Educational Standard Content Design System for Virtual University
Abstract During recent years trying to prove electronic teaching methods, in front of traditional methods have more success. success factors in e-learning are Including platform communications, level of accessibility to the computer user, level of...
2011 / Mohammad Akhshabi, Javad Khalatbari, Alireza Derakhshan, Mostafa Akhshabi -
Research of Ad Hoc Networks Access Algorithm
Abstract With the continuous development of mobile communication technology, Ad Hoc access network has become a hot research, Ad Hoc access network nodes can be used to expand capacity of multi-hop communication range of mobile communication system, ...
2012 / Ma Xiang -
Towards a Ubiquitous User Model for Profile Sharing and Reuse2012 / Maria Martinez-Villaseñor, Miguel Gonzalez-Mendoza, Neil Hernandez-Gress
-
Translation of Restricted OCL Constraints into Graph Constraints for Generating Meta Model Instances by Graph Grammars
Abstract The meta modeling approach to syntax definition of visual modeling techniques has gained wide acceptance, especially by using it for the definition of UML. Since meta-modeling is non-constructive, it does not provide a systematic way to...
2008 / Jessica Winkelmann, Gabriele Taentzer, Karsten Ehrig, Jochen M. Küster -
Accelerated Invariant Generation for C Programs with Aspic and C2fsm
Abstract In this paper, we present Aspic, an automatic polyhedral invariant generation tool for flowcharts programs. Aspic implements an improved Linear Relation Analysis on numeric counter automata. The “accelerated” method improves precision by...
2010 / Paul Feautrier, Laure Gonnord -
Synchrony vs Asynchrony in Communication Primitives
Abstract We study, from the expressiveness point of view, the impact of synchrony in the communication primitives that arise when combining together some common and useful programming features like arity of data, communication medium and possibility ...
2007 / Daniele Gorla -
Preface2007 / Ofer Strichman, Armin Biere
-
Practical Program Extraction from Classical Proofs
Abstract It is well-known that a constructive proof of a Π 2 0 formula F written as a λ-term...
2006 / Yevgeniy Makarov -
Continuous Functions on Final Coalgebras
Abstract In a previous paper we gave a representation of, and simultaneously a way of programming with, continuous functions on streams, whether discrete-valued functions, or functions between streams. We also defined a combinator on the...
2009 / Neil Ghani, Peter Hancock, Dirk Pattinson -
Quantum Circuits: From a Network to a One-Way Model
Abstract We present a translation from the standard network model of quantum computation to the one-way model of quantum computation. The translation is compositional, i.e., it preserves the structure of computations, which allows us to abstract the ...
2011 / Larisse Voufo -
CSP-CASL-Prover: A Generic Tool for Process and Data Refinement
Abstract The specification language Csp-Casl allows one to model processes as well as data of distributed systems within one framework. In our paper, we describe how a combination of the existing tools Hets and Csp-Prover can solve the challenges...
2009 / Liam O'Reilly, Markus Roggenbach, Yoshinao Isobe -
Preface2004 / Josée Desharnais, Prakash Panangaden
-
Specification and Verification of the IEEE 802.11 Medium Access Control and an Analysis of its Applicability to Real-Time Systems
Abstract The use domain of IEEE 802.11 networks has broadened to several types of application, including those that require quality of service and real-time guarantees. This trend in particular, has motivated the use of formal methods, not only to...
2008 / Frederico J.R. Barboza, Aline M.S. Andrade, Flávio Assis Silva, George Lima -
Residual for Component Specifications
Abstract We address the problem of component reuse by describing a quotient operation. Starting from the specifications of the behaviors of the component and of the desired overall system, this operation computes the residual specification...
2008 / Jean-Baptiste Raclet -
Trace Machines for Observing Continuous-Time Markov Chains
Abstract In this paper, we study several linear-time equivalences (Markovian trace equivalence, failure and ready trace equivalence) for continuous-time Markov chains that refer to the probabilities for timed execution paths. Our focus is on testing ...
2006 / Verena Wolf, Christel Baier, Mila Majster-Cederbaum