Computer and information sciences topic list of research papers
-
Building Technology and Science Experiences in 3D Virtual World
Abstract Technology and science experiences play a fundamental role in a society of constant changes and the seemingly endless streams of easily accessible information. Because of this, adult continuous education has arisen as a means of enhancing...
2015 / Maria Aristeidou, Natalia Spyropoulou -
Comparative Study of Variant Position-based VANET Routing Protocols
Abstract A Vehicular Ad hoc Network or VANET is a novel approach of intelligent transportation system technology which has received significant attention recently. The model of the routing protocols used in VANETs is very vital for enhancing the...
2014 / Baraa T. Sharef, Raed A. Alsaqour, Mahamod Ismail -
Introducing Email Portfolio as a Means of Developing EFL Learner's Autonomy
Abstract Second language teaching and learning within a communicative framework posits the learner in a more central role. This article looks at the possibility of developing EFL learner's autonomy through application of email as an electronic...
2014 / Saeed Ganji Khoosf, Mahmood Khosravani -
Building-linked Location-based Instantaneous Services System
Abstract For services which are meant to be used mainly inside buildings, a distribution using global app stores is inappropriate. Instead this work presents a provisioning system (BLISS) for building-linked location-based services. The...
2014 / Julian Ohrt, Volker Turau -
Prioritizing Requirements in Agile Development: A Conceptual Framework
Abstract The advance of technology and business needs have triggered user requirements to evolvealmost every day.It is therefore impossible to fulfill the requirements at once. Agile methods have been introduced to mitigate such issues by...
2014 / Rami Hasan AL-Ta’ani, Rozilawati Razali -
On Concurrent Games with Payoff
Abstract The paper considers an extension of concurrent games with a payoff, i.e. a numerical value resulting from the interaction of two players. We extend a recent determinacy result on concurrent games [Pierre Clairambault, Julian Gutierrez, and...
2013 / Pierre Clairambault, Glynn Winskel -
Effective semantic search using thematic similarity
Abstract Most existing semantic search systems expand search keywords using domain ontology to deal with semantic heterogeneity. They focus on matching the semantic similarity of individual keywords in a multiple-keywords query; however, they ignore ...
2013 / Sharifullah Khan, Jibran Mustafa -
Effect of short circuited DC link capacitor of an AC–DC–AC inverter on the performance of induction motor
Abstract Induction motors are widely used in industrial power plants due to their robustness, reliability and high performance under variable operating conditions in the electrical power system. Modern industrial progress is dependent on these...
2014 / Hadeed Ahmed Sher, Khaled E. Addoweesh, Yasin Khan -
Loopholes of Plagiarism Detection Software
Abstract Nowadays, information becomes more and more important for our society. We can get information from everywhere easily and fast. The release of translation software eliminated the problems of translating a document. As a result of the...
2014 / András Károly Kiss -
Supply Chain Information Risk Management Model in Make-To-Order (MTO)
Abstract In this paper we will discuss about developing Supply Chain Information Risk Management Model in make-to-order (MTO). The development of this model begins with identifying the categories of information, the risk factors that affect the...
2014 / Prima Denny Sentia, Muriati Mukhtar, Syaimak Abdul Shukor -
A Novel Method to Characterize User Sessions of Educational Software
Abstract Software applications destined for the educational environment have a long history and have evolved side by side with the progress of technology from simple computer assisted instruction programs to sophisticated eLearning platforms. A...
2013 / Elena Alina Pitic, Ioana Moisil, Valentin Lup -
An Extended Review of Techniques for Enhancing TCP Performance
Abstract Transmission Control Protocol (TCP) is considered one of the most important protocols in the Internet. An important mechanism in TCP is the congestion control mechanism which controls TCP sending rate and makes TCP react to congestion...
2013 / Mohammed A. Alnuem -
A Hierarchical Framework Using Approximated Local Outlier Factor for Efficient Anomaly Detection
Abstract Anomaly detection aims to identify rare events that deviate remarkably from existing data. To satisfy real-world appli- cations, various anomaly detection technologies have been proposed. Due to the resource constraints, such as limited...
2013 / Lin Xu, Yi-Ren Yeh, Yuh-Jye Lee, Jing Li -
A comparison of refinement orderings and their associated simulation rules
Abstract In this paper we compare the refinement orderings, and their associated simulation rules, of state-based specification languages such as Z and Object-Z with the refinement orderings of event-based specification languages such as CSP. We...
2005 / Christie Bolton, Jim Davies -
Symbolic Computational Techniques for Solving Games
Abstract Games are useful in modular specification and analysis of systems where the distinction among the choices controlled by different components (for instance, the system and its environment) is made explicit. In this paper, we formulate and...
2005 / P. Madhusudan, Wonhong Nam, Rajeev Alur -
The Cook-Berger problem -A guide to the solution
Abstract We show that to any computable, total functional Φ of pure type 3, there is a total PCP-definable functional . We discuss how the program for can ...
2005 / Dag Normann -
Modelling Node Connectivity in Dynamically Evolving Networks
Abstract Node connectivity is a key aspect of dynamically evolving networks. We address the problem of expressing, and constraining, node connectivity at a linguistic level. We extend the language KLAIM (Kernel Language for Agent Interaction and...
2004 / Lorenzo Bettini, Michele Loreti, Rosario Pugliese -
Preface
Abstract RelMiS 2001 This issue contains the Proceedings of the First International Workshop on Relational Methods in Software (RelMiS 2001). The Workshop was held in Genova, Italy, on April 7 and 8, 2001, as a satellite event to...
2005 / Wolfram Kahl, David L. Parnas, Gunther Schmidt -
Proof-theoretic notions for software maintenance
Abstract We discuss proof-theoretic notions as a useful tool to deal with software maintenance in a formal setting.
2005 / Reinhard Kahle -
Type-checking Balloon Types
Abstract Current data abstraction mechanisms are not adequate to control sharing of state in the general case involving objects in linked structures. The pervading possibility of sharing is a source of errors and an obstacle to language...
2004 / Paulo Sérgio Almeida