Computer and information sciences topic list of research papers
-
On the Security of Security Software
Abstract Currently, security appears to be one of the strongest sales arguments for software vendors all over the world. No other sector of the software industry has undergone a similar wave of mergers and acquisitions recently as the producers of...
2005 / Jan Münther -
On the Impact of Entropy Estimation on Transcriptional Regulatory Network Inference Based on Mutual Information2009 / Catharina Olsen, Patrick E. Meyer, Gianluca Bontempi
-
A Similarity-Based Approach for Audiovisual Document Classification Using Temporal Relation Analysis2011 / Zein Al Abidin Ibrahim, Isabelle Ferrane, Philippe Joly
-
An Efficient Grid Scheduling Algorithm with Fault Tolerance and User Satisfaction2013 / P. Keerthika, N. Kasthuri
-
Lower Bounds on the Maximum Energy Benefit of Network Coding for Wireless Multiple Unicast2010 / Jasper Goseling, Ryutaroh Matsumoto, Tomohiko Uyematsu, JosH Weber
-
Self-Dual, Self-Petrie Covers of Regular Polyhedra2012 / Gabe Cunningham
-
Comparison of Various Classification Techniques Using Different Data Mining Tools for Diabetes Diagnosis2013 / Rashedur M. Rahman, Farhana Afroz
-
Center of Mass-Based Adaptive Fast Block Motion Estimation2007 / Hung-Ming Chen, Po-Hung Chen, Kuo-Liang Yeh, Wen-Hsien Fang, Mon-Chau Shie, et al.
-
The Life Cycle and Quality Assurance of Performance Assessment Batteries2012 / R. E. Schlegel, K. Gilliland
-
On the hard-real-time scheduling of embedded streaming applications2012 / Mohamed A. Bamakhrama, Todor P. Stefanov
-
Elicitation of Criteria Weights Maximising the Stability of Pairwise Outranking Statements2013 / Raymond Bisdorff, Patrick Meyer, Thomas Veneziano
-
A variable neighbourhood search algorithm for the constrained task allocation problem2007 / A Lusa, C N Potts
-
Optimizing Referential Coherence in Text Generation2004 / Rodger Kibble, Richard Power
-
An Early Fire Detection Algorithm Using IP Cameras2012 / Leonardo Millan-Garcia, Gabriel Sanchez-Perez, Mariko Nakano, Karina Toscano-Medina, Hector Perez-Meana, et al.
-
Power-aware Design of Logarithmic Prefix Adders in Sub-threshold Regime: A Comparative Analysis
Abstract This paper involves the design and comparative analysis of Han-Carlson and Kogge-Stone adders in sub-threshold regime using three different hybrid logic families. The performance metrics considered for the analysis of the adders are: power, ...
2015 / Priya Gupta, Anu Gupta, Abhijit Asati -
Security and Privacy Dimensions in Next Generation DDDAS/Infosymbiotic Systems: A Position Paper
Abstract The omnipresent pervasiveness of personal devices will expand the applicability of the Dynamic Data Driven Application Systems (DDDAS) paradigm in innumerable ways. While every single smartphone or wearable device is potentially a sensor...
2015 / Li Xiong, Vaidy Sunderam -
Identification of activity stop locations in GPS trajectories by density-based clustering method combined with support vector machines2015 / Lei Gong, Hitomi Sato, Toshiyuki Yamamoto, Tomio Miwa, Takayuki Morikawa
-
GTrust: Group Extension for Trust Models in Distributed Systems2014 / Robson de Oliveira Albuquerque, Luis Javier García Villalba, Tai-Hoon Kim
-
Survey on Mobile User's Data Privacy Threats and Defense Mechanisms
Abstract Nowadays, mobile devices have become an integral part of our daily life. These have proven to be an advantageous scientific invention that fillspersonal and business needs in a very efficient manner. In this era, the availability of mobile...
2015 / Jalaluddin Khan, Haider Abbas, Jalal Al-Muhtadi -
Enhancing Sink-Location Privacy in Wireless Sensor Networks through k-Anonymity2012 / Guofei Chai, Miao Xu, Wenyuan Xu, Zhiyun Lin