Computer and information sciences topic list of research papers
-
Induction on Concurrent Terms
Abstract This paper considers MiniML equipped with a standard big-step semantics and a destination-passing semantics both represented in concurrent LF (CLF) and prove the two semantics equivalent. The proof is then examined yielding insights into...
2008 / Anders Schack-Nielsen -
Strategy Construction in the Higher-Order Framework of TL
Abstract When viewed from a strategic perspective, a labeled rule base in a rewriting system can be seen as a restricted form of strategic expression (e.g., a collection of rules strictly composed using the left-biased choice combinator). This paper ...
2005 / Victor L. Winter -
High-Fidelity C/C++ Code Transformation
Abstract As software systems become increasingly massive, the advantages of automated transformation tools are clearly evident. These tools allow the machine to both reason about and manipulate high-level source code. They enable off-loading of...
2005 / Daniel G. Waddington, Bin Yao -
On the Expressive Power of Schedulers in Distributed Probabilistic Systems
Abstract In this paper, we consider several subclasses of distributed schedulers and we investigate the ability of these subclasses to attain worst-case probabilities. Based on previous work, we consider the class of distributed...
2009 / Sergio Giro, P.R. D'Argenio -
Labelled Markov Processes: Stronger and Faster Approximations2004 / Vincent Danos, Josée Desharnais, Prakash Panangaden
-
Access Control in a Core Calculus of Dependency
Abstract The Dependency Core Calculus (DCC) is an extension of the computational lambda calculus that was designed in order to capture the notion of dependency that arises in information-flow control, partial evaluation, and other...
2007 / Martín Abadi -
Clustering for Monitoring Software Systems Maintainability Evolution
Abstract This paper presents ongoing work on using data mining clustering to support the evaluation of software systems' maintainability. As input for our analysis we employ software measurement data extracted from Java source code. We propose a...
2009 / P. Antonellis, D. Antoniou, Y. Kanellopoulos, C. Makris, E. Theodoridis, et al. -
An Intrusion Detection Algorithm Based On NFPA
Abstract A process oriented intrusion detection algorithm based on Probabilistic Automaton with No Final probabilities (NFPA) is introduced, system call sequence of process is used as the source data. By using information in system call sequence of...
2012 / Zhong Anming -
Research on Key Technologies of Cloud Computing
Abstract With the development of multi-core processors, virtualization, distributed storage, broadband Internet and automatic management, a new type of computing mode named cloud computing is produced. It distributes computation task on the resource ...
2012 / Shufen Zhang, Hongcan Yan, Xuebin Chen -
An Improved Parameter less Data Clustering Technique based on Maximum Distance of Data and Lioyd k-means Algorithm
Abstract K-means algorithm is very well-known in large data sets of clustering. This algorithm is popular and more widely used for its easy implementation and fast working. However, it is well known that in the k-means algorithm, the user should...
2012 / Wan Maseri Binti Wan Mohd, A.H. Beg, Tutut Herawan, K.F. Rabbi -
The Error Performance and Fairness of CUWB Correlated Channels
Abstract The symbol period becomes smaller compared to the channel delay in multiband orthogonal frequency division multiplexing (MB-OFDM) cognitive ultra wideband (CUWB) wireless communications, the transmitted signals experiences...
2012 / Wenwu Meng, Zuoming Feng, Li Yu, Gan Liu -
Enhancement of Vein Patterns in Hand Image for Biometric and Biomedical Application using Various Image Enhancement Techniques
Abstract Captured hand image needs better enhancement technique to detect the vein patterns, due to existence of indistinct state and unwanted noise in hand image which result in false detection of veins. The image preprocessing such as image...
2012 / R. Deepak Prasanna, P. Neelamegam, S. Sriram, Nagarajan Raju -
Extended Queue Backward Congestion Control Algorithms for Web Transfers
Abstract Rapid development of telecommunication technologies and the ever growing network users demands have made network congestion a prominent problem in today's Internet. Congestion brings significant performance degradation to the network the...
2012 / V.Sinthu Janita Prakash, D.I.George Amalarethinam, E.George Dharma Prakash Raj -
A New Illumination Invariant Feature Based on SIFT Descriptor in Color Space
Abstract The SIFT descriptor is one of the most widely used descriptors and Is very stable in regard to change in rotation, scale, affine, illumination, etc. However, because of the greater emphasis on its insensitivity to geometric changes, this...
2012 / Reza Javanmard Alitappeh, Kossar Jeddi Saravi, Fariborz Mahmoudi -
Towards Verification of Well-Formed Transactions in Java Card Bytecode
Abstract Using transactions in Java Card bytecode programs can be rather tricky and requires special attention from the programmer in order to work around some of the limitations imposed and to avoid introducing serious run-time errors due to...
2005 / René Rydhof Hansen, Igor A. Siveroni -
Synthesis of Optimal Strategies Using HyTech
Abstract Priced timed (game) automata extend timed (game) automata with costs on both locations and transitions. The problem of synthesizing an optimal winning strategy for a priced timed game under some hypotheses has been shown decidable in [P....
2005 / Patricia Bouyer, Franck Cassez, Emmanuel Fleury, Kim G. Larsen -
A Covering Algorithm Based on Competition
Abstract In covering algorithm, the order of learning samples is random, but experiments show that the learning sequence has significant impact on the network performance. This paper proposes a new algorithm which is covering algorithm based on...
2012 / Qingsheng Wang, Yueqin Zhang, Xianyang Sun, Bin Liang -
Vehicle Classification under Cluttered Background and Mild Occlusion Using Zernike Features
Abstract Vehicle recognition and classification in a multi-environment containing cluttered background and occlusion is an important part of machine vision. The goal of this paper is to build a vehicle classifier that identifies a “car” vehicle from ...
2012 / B. Nagarajan, V. Devendran -
Detection of Hard Exudates in Color Fundus Images of the Human Retina
Abstract Diabetic Retinopathy is a progressive ocular disease. The disease may advance from mild to severe non-proliferative diabetic retinopathy and it is one of the most significant factors contributing to blindness. Therefore, it is necessary...
2012 / C. JayaKumari, R. Maruthi -
FPGA Implementation of High Speed Low Area DWT Based Invisible Image Watermarking Algorithm
Abstract In recent years, the applications about multimedia have been developed rapidly. Digital media brings about conveniences to the people, because it is easy to be processed. At the same time, it enables the illegal attackers to attack the...
2012 / P Karthigaikumar, Anumol, K Baskaran