Computer and information sciences topic list of research papers
-
Adaptive fuzzy knowledge-based systems for control metabots' mobility on virtual environments2011 / A. Arroyo, F. Serradilla, O. Calvo
-
Performance Analysis of Interworking between WLAN and 3G Networks Based on Three Approaches
Abstract Interworking between WLAN and UMTS actualize the dream of achieving anywhere, anytime Internet access.This paper addresses the issue affecting the transmission of data within WLAN-UMTS interworking system. The key goal of this paper is to...
2012 / Traoré Soungalo, Li Renfa, Zeng Fanzi, Humphrey Njogu Waita -
Confirmation Based Self-Learning Algorithm in LVCSR's Semi-supervised Incremental Learning
Abstract A new data selection algorithm is proposed in this paper for semi-supervised incremental learning of large vocabulary continuous speech recognition (LVCSR) system named Confirmation Based Self-Learning (CBSL). The CBSL algorithm first...
2012 / Haifeng Li, Tian Zhang, Lin Ma -
Configurable pattern-based evolutionary biclustering of gene expression data2013 / Beatriz Pontes, Raúl Giráldez, Jesús S Aguilar-Ruiz
-
A mobile learning tool for improving grammar skills
Abstract It seems that actual software tools utilizing Computer-Mediated Communication mechanisms -like messaging or chat systems- do not help young students to learn good grammar skills. On the contrary, these tools can be detrimental for the...
2010 / Luis A. Guerrero, Sergio Ochoa, Cesar Collazos -
Implementation of Semantic Web Mining on E-Learning
Abstract Semantic Web is a product of Web 2.0 (second generation of web) that is supported with automated semantic agents for processing user data to help the user on ease of use and personalization of services. Web Mining is an application of data...
2010 / Oğuz Mustapaşa, Dilek Karahoca, Adem Karahoca, Ahmet Yücel, Huseyin Uzunboylu -
Harvesting microblogs for contextual music similarity estimation: a co-occurrence-based framework2013 / Markus Schedl, David Hauger, Julián Urbano
-
Adaptive access and rate control of CSMA for energy, rate, and delay optimization2012 / Mahdi Khodaian, Jesús Pérez, Babak H Khalaj, Pedro M Crespo
-
Providing perfect forward secrecy for location-aware wireless sensor networks2012 / Chi-Tung Chen, Shu-Yan Huang, Iuon-Chang Lin
-
An incentive-based multicast route construction scheme for recipient maximization in wireless relay networks2012 / Wen-Hsing Kuo, Che-Wei Chang
-
Goertzel algorithm generalized to non-integer multiples of fundamental frequency2012 / Petr Sysel, Pavel Rajmic
-
A semantical framework for hybrid knowledge bases2010 / Jos de Bruijn, David Pearce, Axel Polleres, Agustín Valverde
-
An adaptive and personalized open source e-learning platform
Abstract This paper proposes the implementation of an adaptive and personalized e-Learning system which is based on open source software and technologies. Adaptation and personalization received very little coverage in e-learning platforms. An...
2011 / Dimitrios Tsolis, Sofia Stamou, Paraskevi Christia, Soultana Kampana, Triseugeni Rapakoulia, et al. -
Context-free pairs of groups I: Context-free pairs and graphs
Abstract Let G be a finitely generated group, A a finite set of generators and K a subgroup of ...
2012 / Tullio Ceccherini-Silberstein, Wolfgang Woess -
The Replication Technology in E-learning Systems
Abstract The distributed systems are attractive for the users with various, interactive activities that require large processing capabilities, resource sharing and high availability. This paper presents the advantages of e-Learning education and...
2011 / Iacob (Ciobanu) Nicoleta – Magdalena -
Empirical Comparisons of Attack and Protection Algorithms for Online Social Networks
Abstract Online social networks, like Facebook, are popular social networking websites, on which hundreds of millions of users make friends and interact with people. There is a large amount of personal information in these networking websites and...
2011 / Mingzhen Mo, Irwin King, Kwong-Sak Leung -
An Network Attack Modeling Method Based on MLL-AT
Abstract In this paper, the method of modeling attack using attack tree is researched. The main goal is effectively using attack tree to model and express multi-stage network attacks. We expand and improve the traditional attack tree. The attack...
2012 / Yan Fen, Yin Xinchun, Huang Hao -
Indoor Unmanned Airship System Airborne Control Module Design
Abstract By adopting STC12C5A60S2 SCM as a system control unit, assisted by appropriate software and hardware resources, we complete the airborne control module's design of unmanned airship system. This paper introduces hardware control module's...
2012 / Gao YongXia, Li YiBo -
What is Mobile Learning? Challenges and Capabilities
Abstract There are currently 1.7 billion mobile phones in use around the world, while the total world population is 6 billion (Keegan, 2004).! In the past 10 years, the increasing development of mobile phone technology has been unbelievably swift:...
2011 / Masoud Hashemi, Masoud Azizinezhad, Vahid Najafi, Ali Jamali Nesari -
Study and Application of Remote Data Moving Transmission under the Network Convergence
Abstract The data transmission is an important problem in remote applications. Advance of network convergence has help to select and use data transmission model. The embedded system and data management platform is a key of the design. With...
2012 / Meng Zhiguo, Zhou Du