Computer and information sciences topic list of research papers
-
Designing Principles of Mobile Learning in ESP Course for Chinese Students
Abstract This paper touches upon some result of current studies of mobile learning in English and analyze the elements of mobile learning in ESP courses for Chinese students(learner, teacher, content, environment, assessment).It also sets the goals...
2012 / Liu Li, Lu Leina -
Design of Publishing Information Service System Based on Web3.0
Abstract Due to the shortcomings of web2.0 technology lacking efforts to support the discovery process of scientific research and reuse of existing products, a complete set of universal semantic web-based publishing information service framework is...
2012 / Huiying Qi, Yazi Li -
Distributed processing of continuous spatiotemporal queries over road networks
Abstract This paper presents a distributed algorithm for processing continuous spatiotemporal queries. Distributed query processing that involve multiple servers is inspired by (1) the need for scalability in terms of supporting a large number of...
2012 / Asmaa Sallam, Khaled Nagi, Mohamed Abougabal, Walid Aref -
A Cloud-Based Recommender System - A Case Study of Delicacy Recommendation
Abstract Delicacy recommendation services are the trend of the future. In this paper, we propose an effective decision support systems (DSS), the Cloud-Based Recommender System (CBRS), which provides the introduction and commentaries of delicacies...
2011 / Chi-Hua Chen, Ya-Ching Yang, Pei-Liang Shih, Fang-Yi Lee, Chi-Chun Lo -
Study of Emotion Recognition Based on Electrocardiogram and RBF neural network
Abstract This paper compares the emotional pattern recognition method between standard BP neural network classifier and RBF neural network classifier. The experiment introduces wavelet transform to analyze the Electrocardiogram (ECG) signal, and...
2011 / Guo Xianhai -
Web-Ob for multiple intelligences observation
Abstract Observation is a daily practice in scholastic and educational contexts, but it needs to develop into a professional competence in order to be helpful. In fact, to design an educative and didactic plan and to provide useful tools, activities ...
2010 / Paola Nicolini, Giuseppe Alessandri, Giuseppe Bilancioni -
An Overview of Privacy Preserving Data Mining
Abstract In recent years, wide available personal data has made privacy preserving data mining issue an important one. An overview of new and rapidly emerging research field of privacy preserving data mining and some exist problems provided in this...
2012 / Xinjun Qi, Mingkui Zong -
Endothelin XII
Abstract Following the initial description of endothelium-dependent vasoconstriction in the early 1980s, it has been exactly 25 years since efforts to identify the sequence of the endothelin gene and peptide began in May 1987, work which resulted in ...
2012 / Matthias Barton, Masashi Yanagisawa, Paul M. Vanhoutte, Tomoh Masaki -
On some geometry and equivalence classes of normal form games2006 / Fabrizio Germano
-
An effective solution for a real cutting stock problem in manufacturing plastic rolls2008 / Ramiro Varela, Camino R. Vela, Jorge Puente, María Sierra, Inés González-Rodríguez
-
Complete and Platform-Independent Calling Context Profiling for the Java Virtual Machine
Abstract Calling context profiling collects statistics separately for each calling context. Complete calling context profiles that faithfully represent overall program execution are important for a sound analysis of program behavior, which in turn...
2011 / Aibek Sarimbekov, Philippe Moret, Walter Binder, Andreas Sewe, Mira Mezini -
A Tool for the Integration of Constraint Solving in Spreadsheets
Abstract Spreadsheets have become widely used tools, but they are applied to increasingly complex problems, far beyond the kind of tasks for which they were originally conceived. This often results in large, hard to maintain sheets, with little...
2012 / Ana María Fernández-Soriano, Julio Mariño, Ángel Herranz -
Outer Joins in a Deductive Database System
Abstract Outer joins are extended relational algebra operations intended to deal with unknown information represented with null values. This work shows an approach to embed both null values and outer join operations in the deductive database system...
2012 / Fernando Sáenz-Pérez -
Interactively exploring elimination orderings in symbolic sparse Cholesky factorization
Abstract When large sparse symmetric systems of linear equations are solved by the Cholesky factorization, nonzero elements can be generated at positions where the original matrix contains zero elements. This phenomenon is called fill-in and it is...
2010 / Michael Lülfesmann, Simon R. Leßenich, H. Martin Bücker -
Linked Open Science-Communicating, Sharing and Evaluating Data, Methods and Results for Executable Papers
Abstract Linked Open Science is an approach to solve challenges of an executable paper. It is a combination of four “silver bullets”: 1) publication of scientific data, metadata, results, and provenance information using Linked Data principles, 2)...
2011 / Tomi Kauppinen, Giovana Mira de Espindola -
Review time in peer review: quantitative analysis and modelling of editorial workflows2016 / Maciej J. Mrowinski, Agata Fronczak, Piotr Fronczak, Olgica Nedic, Marcel Ausloos
-
VizResearch: Linking the Knowledge of People and the People with Knowledge
Abstract Access to information and interaction with peers are dominant demands of collaborative research. To provide academicians information regarding research papers, peers and events there are some research information repositories overleaping...
2012 / Sarah Masud, Monjura Afrin, Farhana Murtaza Choudhury, Syed Ishtiaque Ahmed -
A Learning System for a Computational Science Related Topic
Abstract Computational science is an interdisciplinary field in which mathematical models combined with scientific computing methods are used to study systems of real-world problems. One of such mathematical models is automata theory. This paper...
2012 / Mohamed Hamada, Sayota Sato -
Improved Cryptographic Protection of Information using Robust Authentication Algorithms
Abstract Information is typically transmitted in telecommunication systems in form of messages. Many applications nowadays demand protection of their content and/or authentication of the sender and recipient of the message. Message Authentication...
2013 / Natasa Zivic -
A Tool to Evaluate the Level of Inclusion of Digital Learning Objects
Abstract Inclusive learning integrates pedagogical and technological variables. It means to adapt to students according to their characteristics (personal, physical, cognitive, social…), needs and interests. With the aim of evaluating the level of...
2012 / Mariluz Guenaga, Iratxe Mechaca, Susana Romero, Andoni Eguíluz