Computer and information sciences topic list of research papers
-
Occlusion Invariant Palmprint Recognition with ULBP Histograms
Abstract This work presents a palmprint recognition approach based on the local distribution of uniform patterns. Preprocessing segments palmprint region from foreground of image as well as aligns the palmprint along the line between tips of middle...
2015 / Deepti Tamrakar, Pritee Khanna -
Neural Network Techniques for Cancer Prediction: A Survey
Abstract Cancer is a dreadful disease. Millions of people died every year because of this disease. It is very essential for medical practitioners to opt a proper treatment for cancer patients. Therefore cancer cells should be identified correctly....
2015 / Shikha Agrawal, Jitendra Agrawal -
Towards a Timely Root Cause Analysis for Complex Situations in Large Scale Telecommunications Networks
Abstract Large scale telecommunications networks need to be continuously monitored to detect problems and react accordingly to ensure the networks stability. Current monitoring systems are well capable to monitor such large scale installations for...
2015 / Marc Schaaf, Gwendolin Wilke, Topi Mikkola, Erik Bunn, Ilkka Hela, et al. -
The Subset Sum game
Abstract In this work we address a game theoretic variant of the Subset Sum problem, in which two decision makers (agents/players) compete for the usage of a common resource represented by a knapsack capacity. Each agent owns a set of integer...
2013 / Andreas Darmann, Gaia Nicosia, Ulrich Pferschy, Joachim Schauer -
A formally verified AKA protocol for vertical handover in heterogeneous environments using Casper/FDR2012 / Mahdi Aiash, Glenford Mapp, Aboubaker Lasebae, Raphael Phan, Jonathan Loo
-
Real-time traffic incident detection using a probabilistic topic model
Abstract Traffic congestion occurs frequently in urban settings, and is not always caused by traffic incidents. In this paper, we propose a simple method for detecting traffic incidents from probe-car data by identifying unusual events that...
2015 / Akira Kinoshita, Atsuhiro Takasu, Jun Adachi -
Why Cyber-physical Production Systems Need a Descriptive Engineering Approach – A Case Study in Plug & Produce
Abstract Cyber-physical production systems’ main feature is adaptability, i.e. they adapt automatically to new situations without impairing the system's goals. An example is a smart factory that can adapt to new product variants or production...
2014 / Jens Otto, Steffen Henning, Oliver Niggemann -
Linear-time superbubble identification algorithm for genome assembly
Abstract DNA sequencing is the process of determining the exact order of the nucleotide bases of an individual's genome in order to catalogue sequence variation and understand its biological implications. Whole-genome sequencing techniques produce...
2015 / Ljiljana Brankovic, Costas S. Iliopoulos, Ritu Kundu, Manal Mohamed, Solon P. Pissis, et al. -
Business Reputation of Social Networks of Web Services
Abstract This paper introduces a set of criteria that are used to establish the reputation of a social network from a business perspective. This network is populated with social Web services. Compared to regular Web services, social Web services...
2015 / Zakaria Maamar, Gianpiero Costantino, Marinella Petrocchi, Fabio Martinelli -
Database Versioning 2.0, a Transparent SQL Approach Used in Quantitative Management and Decision Making
Abstract Managerial decisions are based on accurate information and in today's time raw data is produced even with a stroke of a key. Regardless of the data creating process one needs to know how the information was extracted and which pool of data...
2015 / Cosmin Cioranu, Marius Cioca, Carmen Novac -
Human behaviour recognition in data-scarce domains
Abstract This paper presents the novel theory for performing multi-agent activity recognition without requiring large training corpora. The reduced need for data means that robust probabilistic recognition can be performed within domains where...
2015 / Rolf H. Baxter, Neil M. Robertson, David M. Lane -
Collision Attacks on AES-192/256, Crypton-192/256, mCrypton-96/128, and Anubis2013 / Jinkeon Kang, Kitae Jeong, Jaechul Sung, Seokhie Hong, Kyungho Lee
-
Vehicle interconnection metric and clustering protocol for improved connectivity in vehicular ad hoc networks2014 / Samo Vodopivec, Melita Hajdinjak, Janez Bešter, Andrej Kos
-
Fluency of visualizations: linking spatiotemporal visualizations to improve cybersecurity visual analytics2014 / Zhenyu Qian, Yingjie Chen
-
Coverage-aware Unequal Clustering Algorithm for Wireless Sensor Networks
Abstract Wireless Sensor Networks (WSNs) are deployed to monitor physical conditions of various places such as geographical regions, traffic, battlefields, etc. Coverage preservation is the most important issue in such applications. Though the...
2015 / Nabajyoti Mazumdar, Hari Om -
Story-based Vocabulary Teaching
Abstract This paper aims to investigate the effects of stories as contexts on vocabulary recognition and retention. We hypothesize that using stories can be much more effective than using traditional techniques. In order to test our hypothesis an...
2014 / Hilal İnal, Abdulkadir Cakir -
Reducing Tasks Migration in LRE-TL Real-time Multiprocessor Scheduling Algorithm
Abstract In this paper we present a modification of Local Remaining Execution (LRE-TL) real-time multiprocessor scheduling algorithm to reduce tasks migration significantly. LRE-TL, which is based on the concept of fluid scheduling, makes scheduling ...
2014 / Hitham Alhussian, Nordin Zakaria, Fawnizu Azmadi Hussin, Hussein T. Bahbouh -
TELEMODE – A Proposal towards Technology Enhanced Learning, Engineered with MObile DEvices
Abstract Today, mobile devices are widely used than ever before for communication, education, entertainment, research collaboration and social interaction. Schools, higher educational institutions and companies are constantly evolving in offering...
2014 / Vijayarengan Ramanuja Chary -
Fault-tolerant Workflow Scheduling using Spot Instances on Clouds
Abstract Scientific workflows are used to model applications of high throughput computation and complex large scale data analysis. In recent years, Cloud computing is fast evolving as the target platform for such applications among researchers....
2014 / Deepak Poola, Kotagiri Ramamohanarao, Rajkumar Buyya -
Bitpacking techniques for indexing genomes: II. Enhanced suffix arrays2016 / Thomas D. Wu