Computer and information sciences topic list of research papers
-
Rules and Strategies for Contextual Specialization of Constraint Logic Programs
Abstract We address the problem of specializing a constraint logic program w.r.t. a constrained atom which specifies the context of use of the program. We follow an approach based on transformation rules and strategies. We introduce a novel...
2005 / Fabio Fioravanti, Alberto Pettorossi, Maurizio Proietti -
Implementation and Comparison of Speech Emotion Recognition System Using Gaussian Mixture Model (GMM) and K- Nearest Neighbor (K-NN) Techniques
Abstract The kinship between man and machines has become a new trend of technology such that machines now have to respond by considering the human emotional levels. The signal processing and machine learning technologies have boosted the machine...
2015 / Rahul B. Lanjewar, Swarup Mathurkar, Nilesh Patel -
Towards the Development of a Framework for Socially Responsible Software by Analyzing Social Media Big Data on Cloud Through Ontological Engineering
Abstract A socially responsible internet is the need of the hour considering its huge potential and role in educating and transforming the society. Social computing is emerging as an important area as far as development of next generation web is...
2015 / Alok Chauhan, V. Vijayakumar, Rajiv Vincent, K.V. Pradeep -
Goya’s artwork imaging with Terahertz waves2013 / C. Seco-Martorell, V. López-Domínguez, G. Arauz-Garofalo, A. Redo-Sanchez, J. Palacios, et al.
-
Design Scheme for Spatial Database of Climatic and Environmental Variables in Mexico, Integrating Big Data Technology
Abstract Big Data technology offers new and potentially more effective solutions to the continuing challenge of how large raster data sets may be effectively stored and retrieved. Big Data technology not only enables the integration of diverse...
2015 / M. López, S. Couturier, K. Barrera -
Moving from Weakly Endochronous Systems to Delay-Insensitive Circuits
Abstract We consider the problem of synthesizing the asynchronous wrappers and glue logic needed for the correct GALS implementation of a modular synchronous system. Our approach is based on the weakly endochronous synchronous model, which defines...
2006 / S. Dasgupta, D. Potop-Butucaru, B. Caillaud, A. Yakovlev -
An Improved SRL Based Plagiarism Detection Technique Using Sentence Ranking
Abstract Plagiarism means intellectual theft which consists of turning someone else's work as your own. Plagiarism has become widespread in many fields like institutions, companies etc. This paper proposes a new technique which uses Semantic Role...
2015 / Merin Paul, Sangeetha Jamal -
Resiliency of Smart Power Meters to Common Security Attacks
Abstract The development of Smart Grid power systems is gaining momentum in many countries leading to massive deployment of smart meters to realize the envisioned benefits. However, there are several concerns among the consumer communities and the...
2015 / Khaled Shuaib, Zouheir Trabelsi, Mohammad Abed-Hafez, Ahmed Gaouda, Mahmoud Alahmad -
Learning science and science education in a new era
Abstract Today, it takes only a few months for the amount of knowledge to double. The volume of information available has grown so much that it cannot be fully encompassed by the human mind. For this reason, science, learning, and education have to...
2015 / Erhan Aysan -
Approximating closed fork-join queueing networks using product-form stochastic Petri-nets
Abstract Computing paradigms have shifted towards highly parallel processing and massive replication of data. This entails the efficient distribution of requests and the synchronization of results provided to users. Guaranteeing SLAs requires the...
2015 / Rasha Osman, Peter G. Harrison -
The impact of GPU-assisted malware on memory forensics: A case study
Abstract In this paper we assess the impact of GPU-assisted malware on memory forensics. In particular, we first introduce four different techniques that malware can adopt to hide its presence. We then present a case study on a very popular family...
2015 / Davide Balzarotti, Roberto Di Pietro, Antonio Villani -
QD-AMVA: Evaluating systems with queue-dependent service requirements
Abstract Workload measurements in enterprise systems often lead to observe a dependence between the number of requests running at a resource and their mean service requirements. However, multiclass performance models that feature these dependences...
2015 / Giuliano Casale, Juan F. Pérez, Weikun Wang -
Cognitive Vehicular Networks: An Overview
Abstract Cognitive Radio (CR) is extending the applications of wireless communications worldwide. Cognitive radio verifies the electromagnetic spectrum availability and permits the modification of the transmission parameters using the interaction...
2015 / Fabrício B.S. de Carvalho, Waslon T.A. Lopes, Marcelo S. Alencar, José V.S. Filho -
Management Information in Rural Area: A Case Study of Rancasalak Village in Garut, Indonesia
Abstract Information and communication technologies (ICTs) have become a help for human kind in communication, such as TV, radio, newspaper, and internet. However, the availability of media is not much help in disseminating program information...
2014 / Aceng Salim -
Estimating and Validating Relationships between Actual and Perceived Weights for Lifting Objects with a Power Assist Robot: The Psychophysical Approach
Abstract A power assist robot reduces the perceived weights of objects lifted with it. However, the relationships between actual and perceived weights have not been estimated yet that result in inappropriate force programming, improper interactions...
2012 / S. M. Mizanoor Rahman, Ryojun Ikeura -
Multi-level Self-organization in Cyber-Physical-Social Systems: Smart Home Cleaning Scenario
Abstract Cyber-Physical-Social Systems integrate various resources from physical network, cyberspace, and social world.These systems rely on communication, computation and control infrastructures commonly consisting of several levels for the three...
2015 / Alexander Smirnov, Alexey Kashevnik, Andrew Ponomarev -
Domain Equations for Probabilistic Processes (Extended Abstract)
Abstract In this paper we consider Milner's calculus CCS enriched by a probabilistic choice operator. The calculus is given operational semantics based on probabilistic transition systems. We define operational notions of preorder and equivalence as ...
2005 / Christel Baier, Marta Kwiatkowska -
Can Actors and π-Agents Live Together?
Abstract The syntax and semantics of actors and π-agents is first defined separately, using a uniform, “unbiased” approach. New coordination primitives are then added to the union of the two calculi which allow actors and π-agents to cooperate. ...
2005 / Ugo Montanari, Carolyn Talcott -
A Framework for Fair Communicating Processes
Abstract This paper describes a general framework for modeling fairness for communicating processes, based on the notion of fair traces. Intuitively, a fair trace is an abstract representation of a fair computation, providing enough structure to...
2005 / Susan Older -
A heuristic algorithm to approximate dynamic program of a novel new product development process
Abstract We are concerned with a new product development (NPD) network in digital environment in which the aim is to find integrated attributes for value added purposes. Different views exist for new product development. Here, the effective factors...
2013 / Hamed Fazlollahtabar, Iraj Mahdavi, Nezam Mahdavi-Amiri