Computer and information sciences topic list of research papers
-
Preface2007 / Michael Backes, Andre Scedrov
-
Coordinating Agents in Organizations Using Social Commitments
Abstract One of the main challenges faced by the multi-agent community is to ensure the coordination of autonomous agents in open heterogeneous multi-agent systems. In order to coordinate their behaviour, the agents should be able to interact with...
2006 / Cosmin Carabelea, Olivier Boissier -
Intelligent Reconfiguration of Dynamic Distributed Components
Abstract Naming service and the reconfiguration management systems usually work in a client-server manner where both the selection of components and the reconfiguration are a result of a request. Developing intelligent systems that are capable of...
2007 / George R. Ribeiro-Justo, Ahmed Saleh, Tereska Karran -
From Chemical Rules to Term Rewriting
Abstract In this paper, rule-based programming is explored in the field of automated generation of chemical reaction mechanisms. We explore a class of graphs and a graph rewriting relation where vertices are preserved and only edges are changed. We...
2006 / Olivier Bournez, Liliana Ibănescu, Hélène Kirchner -
Position Paper: Thoughts on Programming with Proof Assistants
Abstract Today the reigning opinion about computer proof assistants based on constructive logic (even from some of the developers of these tools!) is that, while they are very helpful for doing math, they are an absurdly heavy-weight solution to use ...
2007 / Adam Chlipala -
Preface2007 / Arend Rensink, Reiko Heckel, Barbara König
-
From Functional Programs to Interaction Nets via the Rewriting Calculus
Abstract We use the ρ-calculus as an intermediate language to compile functional languages with pattern-matching features, and give an interaction net encoding of the ρ-terms arising from the compilation. This encoding gives rise to new strategies...
2007 / Horatiu Cirstea, Germain Faure, Maribel Fernández, Ian Mackie, François-Régis Sinot -
ESBC: an application for computing stabilization bounds
Abstract We describe the application ESBC to perform the timing analysis of a combinatorial circuit. The circuit is described by formulas of Classical Logic and the delays of propagation of the signals in a gate are represented by a kind of...
2006 / Alessandro Avellone, Mauro Ferrari, Camillo Fiorentini, Guido Fiorino, Ugo Moscato -
Using Model Checking to Automatically Find Retrieve Relations
Abstract Downward and upward simulations form a sound and jointly complete methodology for verifying relational data refinement in state-based specification languages such as Z and B. In previous work, we showed how both downward and upward...
2008 / John Derrick, Graeme Smith -
The Application of Data Provenance in Online Informal Learning Environment
Abstract Online informal learning is becoming more and more important as a form of learning in the knowledge society. The development of new educational theory, information technology and social software has brought new opportunities for the online...
2012 / Guo Ying, Zhang Bin, Zhang Cuiling -
The Reading Enterprise
Abstract The starting point of my research is the students’ lack of interest in the written text. The solution I test is a route to the students’ reading competence which is in continuous transformation. The Reading Enterprise represents a set of...
2011 / Aurelian Tufan -
A Robust Image Watermarking Algorithm Based on HHT
Abstract In this paper, we introduce a robust image watermarking method based on Hilbert-Huang Transform (HHT) against geometric distortion. This watermarking is detected by a linear frequency change. The HHT transformation is used to detect the...
2011 / Deng Minghui, Zeng Qingshuang, Yang Juqing -
A Novel Time-domain Focusing Method for Microscope Imaging
Abstract Microscope imaging and focusing technology plays an important role in the image measurement and computer vision. This paper proposes a novel time-domain focusing method. Firstly, edges of original image are detected through gradient...
2011 / Xiangjun Liu, Mei Yu, Yigang Wang, Gangyi Jiang, Songyin Fu, et al. -
Principles and a Framework of Performance Evaluation for Learners in Distance Vocational Education
Abstract Assessment is still a relatively weak component of distance vocational education, especially in the aspects of vocational skills. Performance evaluation pays more attention to the learner's development for skills, and therefore it is needed ...
2011 / Qinglong Zhan, Lin Zhang -
CA Prototype System of Campus Network Based on PKI
Abstract As for the various risks for internet transaction, the paper puts forward a CA system model based on PKI and introduces the concrete methods under the environment of Linux so as to realize the network ID authentication and handle the...
2011 / Yanrong Shi, Yongqiang He -
Introduction of security camera system with privacy protection into a residential area
Abstract Social experiment is explained about introduction of the security camera system with privacy protection into residential area in this paper. In July 2008, this experiment by using the security camera system with privacy protection had been...
2010 / Takashi Yokote, Yusaku Fujii, Koichi Maru, Noriaki Yoshiura, Naoya Ohta, et al. -
Semantic Discovery of Web Services through Social Learning
Abstract The increasing numbers of web services impose automatic discovery process in Service Oriented Architecture (SOA). But the existing SOA enables only syntactic discovery which produces coarse irrelevant results or sometimes no results....
2012 / Sajib Kumar Mistry, Mosaddek Hossain Kamal, Dilip Mistry -
A Testbed for Investigating the UAV Swarm Command and Control Problem Using DDDAS
Abstract Unmanned Aerial Vehicles (UAVs) may become the future of military aviation as technology advances, especially sensors and miniaturization techniques. Currently, however, UAVs are controlled individually and require many resources, including ...
2013 / R. Purta, M. Dobski, A. Jaworski, G. Madey -
A Tabu Search Heuristic for the Prize-collecting Rural Postman Problem
Abstract I present a heuristic based in tabu search, in order to generate feasible solutions for solving the Prize-collecting Rural Postman Problem. This problem was recently defined and is a generalization of other arc routing problems. The...
2011 / Guillermo Palma -
Overfit prevention in adaptive weighted distance nearest neighbor
Abstract Nearest-Neighbor classification was developed to perform discriminant analysis when reliable parametric estimates of probability densities are unknown or difficult to determine. The major disadvantages of NN are its sensitivity to the...
2011 / Elham Parvinnia, Mohammad R. Moosavi, Mansoor Z. Jahromi, Koorush Ziarati