Computer and information sciences topic list of research papers
-
Channel condition self-clocked packet scheduling scheme for wireless networks2013 / Jyh-Ming Chen, Eric Hsiao-Kuang Wu, Hsiang-Wei Lu, Ching-Hsiang Chu, Meng-Feng Tsai
-
Pattern Discovery in DNS Query Traffic
Abstract DNS provides a critical function in directing Internet traffic. Traditional rule-based anomaly or intrusion detection methods are not able to update the rules dynamically. Data mining based approaches can find various patterns in massive...
2013 / Weizhang Ruan, Ying Liu, Renliang Zhao -
An Optimized Energy-aware Routing Protocol for Wireless Sensor Network
Abstract Because sensor nodes typically are battery-powered and in most cases it may not be possible to change or recharge batteries, the key challenge in Wireless Sensor Networks (WSNs) design is the energy-efficiency and how to deal with the...
2011 / Basma M. Mohammad El-Basioni, Sherine M. Abd El-kader, Hussein S. Eissa, Mohammed M. Zahra -
Fuzzy-cost based multiconstrained QoS routing with mobility prediction in MANETs
Abstract Multi-constrained QoS routing deals with finding routes that satisfies multiple independent QoS constraints simultaneously. This paper proposes a Fuzzy cost based Multi constrained Quality of service Routing (FCMQR) protocol to select an...
2012 / G. Santhi, Alamelu Nachiappan -
Evaluation and Self-Evaluation in Simultaneous Translation: Assessments Methods
Abstract The nature of evaluation and self-evaluation in simultaneous interpretation is based on the close connection between the main text (the version proposed by the speaker) and the interpreter's version. Between these two elements a number of...
2012 / Marilena Milcu -
Energy parity games
Abstract Energy parity games are infinite two-player turn-based games played on weighted graphs. The objective of the game combines a (qualitative) parity condition with the (quantitative) requirement that the sum of the weights (i.e., the level of...
2012 / Krishnendu Chatterjee, Laurent Doyen -
Tackling Application-layer DDoS Attacks
Abstract In application-layer distributed denial of service (DDoS) attacks, zombie machines attack the victim server through legitimate packets such that packets havelegitimate format and are sent through normal TCP connections. Consequently,...
2012 / Hakem Beitollahi, Geert Deconinck -
Design modified architecture for MCS-51 with innovated instructions based on VHDL
Abstract This paper introduces two new complex instructions over the application with specific instruction set processor. For the MCS-51 family, utilizing a reserved bit, and the unused machine code “A5h” we can modify the conventional instruction...
2013 / Abd-Elmoneim Mohamed Fouda, Assem Badr Eldeen -
Fast approximate maximum likelihood period estimation from incomplete timing data
Abstract To estimate the period of a periodic point process from noisy and incomplete observations, the classical periodogram algorithm is modified. The original periodogram algorithm yields an estimate by performing grid search of the peak of a...
2013 / Ye Haohuan, Liu Zheng, Jiang Wenli -
EcoTM: Conflict-aware Economical Unbounded Hardware Transactional Memory
Abstract Transactional Memory (TM) is a promising paradigm for parallel programming. TM allows a thread to make a series of memory accesses as a single, atomic, transaction, while avoiding deadlocks, livelocks, and other problems commonly associated ...
2013 / Saša Tomić, Ege Akpinar, Adrian Cristál, Osman Unsal, Mateo Valero -
The Constructivist Learning Environments Model Enhancing Cognitive Flexibility for Higher Education: Validation Phase
Abstract The purposes of this research are to examine the internal validation and the external validation of the development of the constructivist learning environments model enhancing cognitive flexibility for higher education. The target group for ...
2012 / Deejring Kwanjai, Chaijaroen Sumalee -
Teaching Digital Signal Processing
Abstract An undergraduate level laboratory course on digital signal processing (DSP) is described. The primary purpose of the laboratory is a better understanding of the theoretical concepts, and to let the students experience actual DSP happening...
2012 / Dogan Ibrahim -
Study and Realization of Large Rotation Angle Matching Images Algorithm Based on Charateristic Matching
Abstract Combining the advantages of SIFT charateristic matching and pyramid image matching, this paper aims to solve the matching problem of automatic rotation with large rotation angle in aerial photographing. To start with, match the images at...
2013 / YongSong Zhu -
A Collaborative Simulation Framework based on Distributed Computing Environment
Abstract Large-scale complex system modeling and simulation involves multidisciplinary knowledge. It is usually necessary to create models using different modeling languages and methods. Therefore, a simulation system built by these models has the...
2013 / Feng Zhu, Yiping Yao, Tengfei Hu, Laibin Yan -
Towards Self-Regulated Learning in School Curriculum
Abstract The concepts of learner autonomy and self-regulated learning have gained voice throughout the recent years as constructs characterizing successful and proficient learners. Self-regulation refers to the process through which learners...
2012 / Seifodin Rajabi -
Using Reputation Systems and Non-Deterministic Routing to Secure Wireless Sensor Networks2009 / José M. Moya, Juan Carlos Vallejo, David Fraga, Álvaro Araujo, Daniel Villanueva, et al.
-
Track and Cut: Simultaneous Tracking and Segmentation of Multiple Objects with Graph Cuts2008 / Aurélie Bugeau, Patrick Pérez
-
FACC: A Novel Finite Automaton Based on Cloud Computing for the Multiple Longest Common Subsequences Search2012 / Yanni Li, Yuping Wang, Liang Bao
-
A Generalized Algorithm for the Generation of Correlated Rayleigh Fading Envelopes in Wireless Channels2005 / Le Chung Tran, Tadeusz A Wysocki, Alfred Mertins, Jennifer Seberry
-
A new iterative algorithm for geolocating a known altitude target using TDOA and FDOA measurements in the presence of satellite location uncertainty
Abstract This paper considers the problem of geolocating a target on the Earth surface whose altitude is known previously using the target signal time difference of arrival (TDOA) and frequency difference of arrival (FDOA) measurements obtained at...
2015 / Yalu Cao, Li Peng, Jinzhou Li, Le Yang, Fucheng Guo