Computer and information sciences topic list of research papers
-
Foreword2004 / Mike Atkinson
-
Deduction, Strategies, and Rewriting
Abstract Automated deduction methods should be specified not procedurally, but declaratively, as inference systems which are proved correct regardless of implementation details. Then, different algorithms to implement a given inference system should ...
2007 / Steven Eker, Narciso Martí-Oliet, José Meseguer, Alberto Verdejo -
Inconsistency Management and View Updates
Abstract Inconsistency management in component-based languages is the identification and resolution of conflicting constraints or expectations between the different components which make up a system. Here we present a category theoretical framework...
2005 / Catherine Menon, Michael Johnson, Charles Lakos -
Formal Specification of Correlation in WS Orchestrations Using BP-calculus
Abstract Correlation is an important mechanism used in orchestration languages for Web Services. It expresses means by which many instances of the same service can be carried on at the same time. In this paper we extend the BP-calculus, a language...
2009 / Faisal Abouzaid, John Mullins -
Model Testing Asynchronously Communicating Objects using Modulo AC Rewriting
Abstract Testing and verification of asynchronously communicating objects in open environments are challenging due to non-determinism. We explore a formal approach for black-box testing by proposing an interface specification language that gives an...
2010 / Olaf Owe, Martin Steffen, Arild B. Torjusen -
Name-passing style GUI programming in the π-calculus-based language Nepi
Abstract This paper describes name-passing style Graphic User Interface (GUI) programming in the programming language Nepi whose operational semantics is based on the rendezvous-style name-passing communication of the π-calculus. Nepi is able to...
2005 / Atsushi Mizuno, Ken Mano, Yoshinobu Kawabe, Hiroaki Kuwabara, Kiyoshi Agusa, et al. -
An Overlapping Structured P2P for REIK Overlay Network
Abstract REIK is based on a ring which embedded an inverse Kautz digraph, to enable multi-path P2P routing. It has the constant degree and the logarithmic diameter DHT scheme with constant congestion and Byzantine fault tolerance. However, REIK did...
2012 / Wenjun Liu, Jingjing Song, Jiguo Yu -
Spatial Statistics for Wireless Networks Research
Abstract Wireless networks have become an important part of our daily lives. However, while the networking research community has made great progress in developing the communication technologies themselves, the underlying dynamics of deployment and...
2011 / Janne Riihijärvi, Petri Mähönen -
A new algorithm for calculating ventilation network reliability based on truncation error theory and network simplification
Abstract Study of reliability algorithms for large-scale and complicated ventilation networks is one of the hotspot research areas in this field both at home and abroad. At present, there is too much operand caused by combination explosion in...
2009 / Jin-zhang Jia, Guang-wei Zang, Zhou Qian, Feng Xiao -
Interpolation Based Image Watermarking using Segmentation Resisting to Geometrical Attacks
Abstract The main theme of this application is to provide an algorithm for grayscale and color image watermark to manage the attacks such as rotation, scaling and translation. In the existing watermarking algorithms, those exploited robust features...
2012 / J. Veerappan, G. Pitchammal -
Proposal of an Information System for a Semi-automatic Virtual Reconstruction of Archeological Sites
Abstract In some business areas there is the need to use representations of places or buildings in order to provide visual informations. These representations are, mainly, reconstructions of scaled real models or virtual representations produced in...
2012 / Telmo Adão, Luís Magalhães, Maximino Bessa, João Barreira, Miguel Melo, et al. -
A Comprehensive Overview on Application of Trust and Reputation in Wireless Sensor Network
Abstract Trust is being deployed along side with cryptography in WSN to achieve better security. This paper describes about how the various systems that are designed to act against attacks with various resource constraints. The design of the...
2012 / G. Edwin Prem Kumar, I. Titus, Sony. I. Thekkekara -
A distributed architecture for storing and processing multi channel multi-sensor athlete performance data
Abstract Over the last decade, inertial sensors have become a valuable tool for extracting quantitative data from athletes. Due to their small size, unobtrusive nature and relative affordability, there is considerable interest in using multi-channel ...
2012 / Jason R. Ride, Daniel A. James, James B. Lee, David D. Rowlands -
Genetic Algorithm based Weight Extraction Algorithm for Artificial Neural Network Classifier in Intrusion Detection
Abstract Neural Networks and Genetic Algorithms are two techniques for optimization and learning, each with its own strengths and weaknesses. The two have generally evolved along separate paths. In this paper we have described a different genetic...
2012 / P. Srinivasu, P.S. Avadhani -
Rough Set based Attribute Clustering for Sample Classification of Gene Expression Data
Abstract Attribute clustering is one of the unsupervised data mining applications which have been previously used to identify statistical dependence between subsets of variables where the attributes within the same cluster have high similarity, but...
2012 / Rudra Kalyan Nayak, Debahuti Mishra, Kailash Shaw, Sashikala Mishra -
Multi-paradigm Models as Source for Automated Test Construction
Abstract The article discusses problems of model based test construction and ways of their solution using different kinds of models (operational, contract, axiomatic, and history-based specifications). The main idea is that the integration of model...
2005 / Victor V. Kuliamin -
Safety Property Verification of Cyclic Synchronous Circuits2004 / Koen Claessen
-
Machine-Checkable Correctness Proofs for Intra-procedural Dataflow Analyses
Abstract This paper describes our experience using the interactive theorem prover Athena for proving the correctness of abstract interpretation-based dataflow analyses. For each analysis, our methodology requires the analysis designer to formally...
2005 / Alexandru Sălcianu, Konstantine Arkoudas -
Validating More Loop Optimizations
Abstract Translation validation is a technique for ensuring that a translator, such as a compiler, produces correct results. Because complete verification of the translator itself is often infeasible, translation validation advocates coupling the...
2005 / Ying Hu, Clark Barrett, Benjamin Goldberg, Amir Pnueli -
Web Services as a New Approach to Distributing and Coordinating Semantics-Based Veri cation Toolkits
Abstract Formal veri cation toolkits are typically of rather special and, if one compares di erent related toolkits to each other, complementary functionalities. It has therefore been proposed to integrate di erent related toolkits within common...
2004 / Michael Baldamus, Jesper Bengtson, Gianluigi Ferrari, Roberto Raggi