Computer and information sciences topic list of research papers
-
Power Management and Tasks Scheduling Analysis in Power-Aware Real-Time Systems
Abstract Power aware computing has become popular recently because of the vast application of the portable systems. Many mechanisms have been proposed to manage energy consumption based on the dynamic voltage scaling. In this paper, we give a...
2012 / Jingyu Xing, Zhang Feng -
Study on coalface stray current safety early warning based on ANFIS
Abstract By analyzing the DC traction supply system in coal mine, we confirmed the following four parameters to be the characteristic parameters of workface stray current safe early warning, that is, the leakage current of contacting line,...
2009 / Wang Chong-lin, Ma Cao-yuan, Liu Jian-hua, Li Guo-xin, Zhang Dong-liang, et al. -
Detecting objects using color and depth segmentation with Kinect sensor
Abstract In order to optimize the movements of a robot, every object found in the work environment must not just be identified, but located in reference to the robot itself. Usually, object segmentation from an image is achieved using color...
2012 / José-Juan Hernández-López, Ana-Linnet Quintanilla-Olvera, José-Luis López-Ramírez, Francisco-Javier Rangel-Butanda, Mario-Alberto Ibarra-Manzano, et al. -
A Comprehensive Survey on Approaches to Intrusion Detection System
Abstract As there is a wide spread of Internet services all over the world, many kinds and large number of security threats are increasing. Since it is not technically feasible to build a system with no vulnerabilities, Intrusion detection System,...
2012 / A.J. Deepa, V. Kavitha -
Synchronized OFDM System Using Inter-Symbol Pilots
Abstract OFDM is a multicarrier modulation technique which has many advantages like spectral efficiency, robust to multipath fading effect etc. But it is very sensitive to Synchronization Error which increases the error rate and degrades the system...
2012 / N.R. Raajan, A. Jenifer Philomina, K. Avudaiappan, V. Avinash -
Space Time Coding Scheme for MIMO system-Literature Survey
Abstract In MIMO system multiple antennas are used at transmitter and receiver side. MIMO has many advantages in comparison to SISO in terms of capacity, bit-rate and reliability. MIMO is classified mainly in three categories: spatial multiplexing,...
2012 / Mehul R. Amin, Sameer D. Trapasiya -
A New and Efficient Method for Removal of High Density Salt and Pepper Noise Through Cascade Decision based Filtering Algorithm
Abstract In this paper, a new and efficient cascade decision based filtering algorithm for the removal of high density Salt and Pepper Noise in images is proposed. The proposed algorithm is a cascaded filter employing a Modified Decision Based...
2012 / Ashutosh Pattnaik, Sharad Agarwal, Subhasis Chand -
Evaluating P2P Networks against Eclipse Attacks
Abstract Due to its distributed nature, the P2P networks are subject to more intricate attacks than client-server networks. Therefore, the security issues on a P2P network represent a great research challenge. Most P2P networks do not have a central ...
2012 / Francisco de Asís López-Fuentes, Iñaki Eugui-De-Alba, Otoniel M. Ortíz-Ruiz -
Threat-Oriented Security Framework: A Proactive Approach in Threat Management
Abstract Present day sophisticated and innovative attacks have resulted in exponentially increasing security problems. This paper therefore presents a three phased threat-oriented security model to meet the above security challenges as a part of...
2012 / Vandana Gandotra, Archana Singhal, Punam Bedi -
Specification for security Orchestration
Abstract In this parchment, we grafted a process – oriented tool, that the specification of the security characteristics on the level service composition. The tool becomes on concepts of the summary services and concrete, just as on the concept of...
2012 / Aradhana Goutam, Raj Kamal, Maya Ingle -
A summary of virtualization techniques
Abstract Nowadays, virtualization is a technology that is applied for sharing the capabilities of physical computers by splitting the resources among OSs. The concept of Virtual Machines (VMs) started back in 1964 with a IBM project called CP/CMS...
2012 / Fernando Rodríguez-Haro, Felix Freitag, Leandro Navarro, Efraín Hernánchez-sánchez, Nicandro Farías-Mendoza, et al. -
Network Status Aware Routing in 3D-CGIN
Abstract 3D-CGIN is a CGIN providing at least 3 disjoint paths between any communicating pair. It uses alternate source for every sender to ensure availability of 3 disjoint paths. 3D-CGIN is compatible with distance tag routing and destination tag...
2012 / Meenal A. Borkar, Nitin -
Towards Composition Management for Component-based Peer-to-Peer Architectures
Abstract Recent peer-to-peer architectures do not fulfill the idea of a service-oriented architecture to allow the flexible composition of services towards concrete applications. This can be justified by the absence of flexible notations for the...
2005 / Sascha Alda, Armin B. Cremers -
Prototyping Concurrent Systems with Agents and Artifacts: Framework and Core Calculus
Abstract More and more aspects of concurrency and concurrent programming are becoming part of mainstream programming and software engineering, due to several factors such as the widespread availability of multi-core / parallel architectures and...
2008 / Alessandro Ricci, Mirko Viroli, Maurizio Cimadamore -
Foreword2004 / Flavio Corradini, Uwe Nestmann
-
From Rogue to MicroRogue
Abstract The Rewriting Calculus has been proposed as a foundational system combining the central ideas of λ-calculus and term rewriting. The rewriting is explicit, in the sense that rules must be applied explicitly to terms to transform them. This...
2005 / Aaron Stump, Ryan Besand, James C. Brodman, Jonathan Hseu, Bill Kinnersley -
Preface2005 / Maria Paola Bonacina, Thierry Boy de la Tour
-
Improving Software Quality in Safety-Critical Applications by Model-Driven Verification
Abstract We propose a new development scheme for quality-aware applications, quality-driven development (QDD), based on the Model-Driven Architecture (MDA) of Object Management Group OMG. We argue that software development in areas, such as...
2005 / Anders Henriksson, Uwe Aßman, James Hunt -
Signature Verification: A Comprehensive Study of the Hidden Signature Method2015 / Joanna Putz-Leszczyńska
-
A New Stereo Image Watermarking Method for 3D Media
Abstract A new stereo image watermarking method for three dimensional media, based on the concept of smooth and nonsmooth blocks relationship is proposed. The features of smooth and non-smooth are distinguished by the alternative current...
2012 / Mei Yu, Aihong Wu, Ting Luo, Gangyi Jiang, Wujie Zhou, et al.