Computer and information sciences topic list of research papers
-
Towards an Arithmetic Theory of Consistency Enforcement based on Preservation of δ-constraints
Abstract Consistency Enforcement provides an alternative theory to common verification techniques within formal specification languages. We consider specifications in the form of guarded commands. The basic idea is then to replace a program...
2004 / Sebastian Link, Klaus-Dieter Schewe -
Privacy in wireless sensor networks using ring signature
Abstract The veracity of a message from a sensor node must be verified in order to avoid a false reaction by the sink. This verification requires the authentication of the source node. The authentication process must also preserve the privacy such...
2014 / Ashmita Debnath, Pradheepkumar Singaravelu, Shekhar Verma -
A Novel Hash based Technique for Thermal Image Authentication
Abstract This paper proposed a hash based steganographic approach in thermal images for authentication. Thermal images used in security measures for surveillance suffer from lack of authenticity. Thermal images are taken as cover images and bits...
2014 / Madhumita Sengupta, Pragati Mandal, Tanmoy Das, Abhijit Dey -
The ALICE data acquisition system
Abstract In this paper we describe the design, the construction, the commissioning and the operation of the Data Acquisition (DAQ) and Experiment Control Systems (ECS) of the ALICE experiment at the CERN Large Hadron Collider (LHC). ...
2013 / F. Carena, W. Carena, S. Chapeland, V. Chibante Barroso, F. Costa, et al. -
Modified Cooperative Access with Relay’s Data (MCARD) based Directional Antenna for multi-rate WLANs
Abstract In this paper, for multi-rate wireless local area networks (WLANs), a modified protocol in Medium Access Control (MAC), called Modified Cooperative Access with Relay’s Data (MCARD) based Directional Antenna using half wave length dipole in...
2014 / Ahmed Magdy, S. Sayed, K.R. Mahmoud, I.I. Ibrahim -
SMT for Polynomial Constraints on Real Numbers
Abstract This paper preliminarily reports an SMT for solving polynomial inequalities over real numbers. Our approach is a combination of interval arithmetic (over-approximation, aiming to decide unsatisfiability) and testing (under-approximation,...
2012 / To Van Khanh, Mizuhito Ogawa -
Freyd categories are Enriched Lawvere Theories
Abstract Lawvere theories provide a categorical formulation of the algebraic theories from universal algebra. Freyd categories are categorical models of first-order effectful programming languages. The notion of sound limit...
2014 / Sam Staton -
Toward Paperless Public Announcement on Environmental Impact Assessment (EIA) through SMS Gateway in Indonesia
Abstract This paper investigates the possibility of transforming information distribution from printed to SMS based media on the implementation of EIA Public Announcement in Indonesia. Based on Indonesian Ministry of Environment Regulation, the...
2014 / Satria Fadil Persada, Mohammad Razif, Shu Chiang Lin, Reny Nadlifatin -
The recovery of pollen evidence from documents and its forensic implications
Abstract Three experiments were undertaken to establish the potential for forensic palynological analysis in cases of suspected document fraud. The first study tested 6 different types of paper and 9 different types of ink (n=54) and it was...
2013 / R.M. Morgan, G. Davies, F. Balestri, P.A. Bull -
Assessment of the Risk of the Project's Contractor Bankruptcy Using the Partial Least Squares Approach
Abstract The project owner or authorized entity (e.g. project manager) is at some point before the decision problem of the delegation execution professional specialist. Typically, on the services market, operates a number of contractors capable of...
2014 / Pawel Blaszczyk, Tomasz Blaszczyk -
A hybrid approach for efficient anomaly detection using metaheuristic methods
Abstract Network intrusion detection based on anomaly detection techniques has a significant role in protecting networks and systems against harmful activities. Different metaheuristic techniques have been used for anomaly detector generation. Yet,...
2014 / Tamer F. Ghanem, Wail S. Elkilani, Hatem M. Abdul-kader -
Enriching semantic knowledge bases for opinion mining in big data applications
Abstract This paper presents a novel method for contextualizing and enriching large semantic knowledge bases for opinion mining with a focus on Web intelligence platforms and other high-throughput big data applications. The method is not only...
2014 / A. Weichselbraun, S. Gindl, A. Scharl -
Algorithms for Constructing Resource-saving Cutting Machines
Abstract ICP and ECP technologies for cutting sheet material belong to so called resource-saving technologies. Those allow to overlap the outlines of cut-off details. This article describes mathematical models of cutoff using these technologies and...
2015 / T. Makarovskikh, E. Savitskiy -
Ecogeography-based optimization: Enhancing biogeography-based optimization with ecogeographic barriers and differentiations
Abstract Biogeography-based optimization (BBO) is a bio-inspired metaheuristic based on the mathematics of island biogeography. The paper proposes a new variation of BBO, named ecogeography-based optimization (EBO), which regards the population of...
2014 / Yu-Jun Zheng, Hai-Feng Ling, Jin-Yun Xue -
A rule-based method for scalable and traceable evaluation of system architectures2014 / Daniel Selva, Bruce Cameron, Edward F. Crawley
-
A Multi-Agent Framework for Packet Routing in Wireless Sensor Networks2015 / Dayong Ye, Minjie Zhang, Yun Yang
-
A Vision-Based System for Intelligent Monitoring: Human Behaviour Analysis and Privacy by Context2014 / Alexandros Chaaraoui, José Padilla-López, Francisco Ferrández-Pastor, Mario Nieto-Hidalgo, Francisco Flórez-Revuelta
-
Data Management for the Internet of Things: Design Primitives and Solution2013 / Mervat Abu-Elkheir, Mohammad Hayajneh, Najah Ali
-
An Improved DNA Based Dual Cover Steganography
Abstract Dual cover steganography is an evolving technique in the field of covert data transmission. This paper focuses on the concept of using a theoretical single stranded DNA (ssDNA) as a primary cover, which is extracted from an inconspicuous...
2015 / Prasenjit Das, Subhrajyoti Deb, Nirmalya Kar, Baby Bhattacharya -
Performance Evaluation of Multiband CSMA/CA with RTS/CTS for M2M Communication with Finite Retransmission Strategy
Abstract M2M communication is information exchange between machines and machines without any human interaction. M2M communication based on cellular network suffers from the extremely large number of devices in service coverage. In cellular network...
2014 / Baher Mawlawi, Jean-Baptiste Dore, Nikolai Lebedev, Jean-Marie Gorce