Computer and information sciences topic list of research papers
-
An Empirical Evaluation of a Programming Model for Context-Dependent Real-time Streaming Applications
Abstract We present a first evaluation of a Programming Model for real-time streaming applications on high performance embedded multi- and many-core systems. Realistic streaming applications are highly dependent on the execution context (usually of...
2015 / Xuan Khanh Do, Stephane Louise, Albert Cohen -
An Efficient Adaptive Anticollision Algorithm Based on 4-Ary Pruning Query Tree2013 / Wei Zhang, Yajun Guo, Xueming Tang, Guohua Cui, Longkai Wu, et al.
-
Fast Path Finding System with GPGPU Computing for Replacement Tasks in Plant Maintenance
Abstract Plant constructors maintain the performance of plant by health diagnosis and replacements of deteriorated components. The maintenance business becomes one of the important revenue sources for the constructors because profit rate of the...
2014 / Y. Nonaka, A. Enomoto, N. Fujii, J. Kolibabka, J. Rasch, et al. -
Information Security Management in Saudi Arabian Organizations
Abstract Information security is a growing concern among various organizations and companies worldwide. Though organizations are generally focusing on external security threats but there could be substantial threats within the organization. This...
2015 / Maryam Alsaif, Nura Aljaafari, Abdul Raouf Khan -
Water Distribution System Clustering and Partitioning Based on Social Network Algorithms
Abstract The partitioning of water distribution system is a complex process achieved defining network clusters arranged in sectors, with the complete isolation of clusters through gate valves, or arranged in districts, inserting both gate valves and ...
2015 / Armando Di Nardo, Michele Di Natale, Carlo Giudicianni, Dino Musmarra, Giovanni Francesco Santonastaso, et al. -
Electrical Integrity and its Protection for Reliable Operation of Superconducting Machines
Abstract The SIS100 synchrotron is the core accelerator of the FAIR project (Darmstadt, Germany). The long term operation of such an advanced superconducting machine requires adequate Electrical Integrity. Issues related to EI shall be taken into...
2015 / A. Stafiniak, P. Szwangruber, W. Freisleben, E. Floch -
Soft Computing Methodology for Software Evaluation
Abstract Evaluation, comparison, and selection of software products are frequent decision problems. Soft computing offers efficient methodology for solving such problems. Our evaluation models are based on the Logic Scoring of Preference (LSP)...
2015 / Jozo Dujmovic -
Identifying Problem Solving Strategies for Learning Styles in Engineering Students Subjected to Intelligence Test and EEG Monitoring
Abstract The cognitive approach of learning agrees in that behavior of the individual correlates with certain complex and dynamic mental processing operations modulated by certain internal mechanisms learned or improved during life. Applied to...
2015 / Felisa M. Córdova, M. Hernán Díaz, Fernando Cifuentes, Lucio Cañete, Fredi Palominos -
Recent advances on artificial intelligence and learning techniques in cognitive radio networks2015 / Nadine Abbas, Youssef Nasser, Karim El Ahmad
-
On the Expressiveness of Timed Coordination via Shared Dataspaces
Abstract Since Linda, many differents coordination models using shared dataspaces have been developped. However, a few only have incorporated the notion of time. This paper builds upon previous work to study the expressive power of two families of...
2007 / Isabelle Linden, Jean-Marie Jacquet -
Security of Analysis Mutual Authentication And Key Exchange for Low Power Wireless CommunicationsI
Abstract This article points out mutual authentication and key exchange protocols for low power wireless communications (called MAKEP) due to Wong and Chan is insecure against forgery attacks, namely an intruder can construct a valid response to...
2012 / Chenglian Liu, Sisheng Chen, Shuliang Sun -
Quantitative Static Analysis Over Semirings: Analysing Cache Behaviour for Java Card
Abstract We present a semantics-based technique for modeling and analysing resource usage behaviour of programs written in a simple object oriented language like Java Card byte code. The approach is based on the quantitative abstract interpretation...
2006 / Pascal Sotin, David Cachera, Thomas Jensen -
Transforming Area Coverage to Target Coverage to Maintain Coverage and Connectivity for Wireless Sensor Networks2012 / Xiu Deng, Jiguo Yu, Dongxiao Yu, Congcong Chen
-
Designing a Voip Based Language Test
Abstract Assessing speaking is one of the most difficult tasks in computer based language testing. Many countries all over the world face the need to implement standardized language tests where speaking tasks are commonly included. However, a number ...
2015 / Jesus Garcia Laborda, Teresa Magal Royo, Nuria Otero de Juan, Jose L. Gimenez Lopez -
Recent Developments in the Field of Bug Fixing
Abstract In recent times, there have been lot of work done in the field of bug fixing in the software development process. We hereby have conducted a review of the seven recent techniques in the field of bug fixing and have made a report on it. ...
2015 / Varun Mittal, Shivam Aditya -
Generating Optimal Query Plans for Distributed Query Processing using Teacher-Learner Based Optimization
Abstract Modern day's queries are posed on database spread across the globe, this may impose a challenge on processing queries efficiently, and a strategy is required to generate optimal query plans. In distributed relational database systems, due...
2015 / Vikash Mishra, Vikram Singh -
Hybrid User-Item Based Collaborative Filtering
Abstract Collaborative filtering (CF) is widely used in recommendation systems. Traditional collaborative filtering (CF) algorithms face two major challenges: data sparsity and scalability. In this study, we propose a hybrid method based on item...
2015 / Nitin Pradeep Kumar, Zhenzhen Fan -
Graph Representation of Relational Database for Concept Discovery
Abstract Multi-relational concept discovery aims to find the relational rules that best describe the target concept. In this paper, we present a graph-based concept discovery method in Multi-Relational Data Mining. Concept rule discovery aims at...
2015 / Mahmut Iğde, Yusuf Kavurucu, Alev Mutlu -
Frequent Bit Pattern Mining Over Tri-axial Accelerometer Data Streams for Recognizing Human Activities and Detecting Fall
Abstract Human fall causes injuries and may even lead to death in the case of older age. Due to increasing elderly population every year to the total population and the health problems and risks caused by fall especially among the age group of 60...
2013 / C.Sweetlin Hemalatha, V. Vaidehi -
Secure floating point arithmetic and private satellite collision analysis2014 / Liina Kamm, Jan Willemson