Computer and information sciences topic list of research papers
-
Binarization based Image Edge Detection using Bacterial Foraging Algorithm
Abstract Bacterial Foraging Algorithm (BFA) is one of the powerful bio-inspired optimization algorithms which attempt to imitate the single and groups of E. Coli bacteria. In BFA algorithm, a set of bacteria try to forage towards a nutrient rich...
2012 / Om Prakash Verma, Rishabh Sharma, Deepak Kumar -
Stably Compact Spaces and the Probabilistic Powerspace construction2004 / Achim Jung
-
Electronic Voting Scheme About ElGamal Blind-signatures Based on XML
Abstract Present an electronic voting algorithm about ElGamal blind-signature based on XML and analyze its security, accounting to the current electronic voting scheme and the ElGamal blind-signature algorithm. The program uses the specification of...
2012 / F. Song, Z. Cui -
Network Anomaly Detection by Cascading K-Means Clustering and C4.5 Decision Tree algorithm
Abstract Intrusions pose a serious securing risk in a network environment. Network intrusion detection system aims to identify attacks or malicious activity in a network with a high detection rate while maintaining a low false alarm rate. Anomaly...
2012 / Amuthan Prabakar Muniyandi, R. Rajeswari, R. Rajaram -
Optimizing Operating Cost of an Intrusion Detection System2013 / Usha Banerjee, K. V. Arya
-
The Algorithm for Calculating the Minimal Disk
Abstract The purpose of this paper is to calculate the minimal disk which contains all the eigenvalues of matrices. In order to obtain the minimal disk which contains all the eigenvalues of matrices, an algorithm is presented. ...
2011 / Yanqiu Wu, Limin Zou -
An axiomatic characterization of a value for games in partition function form2010 / Cheng-Cheng Hu, Yi-You Yang
-
Blind Principles Based Interference and Noise Reduction Schemes for OFDM2012 / M. G. S. Sriyananda, J. Joutsensalo, T. Hämäläinen
-
An integrated approach for requirement selection and scheduling in software release planning2010 / Chen Li, Marjan van den Akker, Sjaak Brinkkemper, Guido Diepen
-
Automating Soundness Proofs
Abstract When developing a new language with semantics described by Structural Operational Semantics (SOS), one often wants an axiomatisation of this language (w.r.t. to some equivalence) as well. We describe a method for automating the...
2009 / Muck van Weerdenburg -
Tool Support for Engineering Certifiable Software
Abstract Formal methods can effectively support the model driven develoment and analysis of IT applications in many domains. Typically, the domain-specific engineering models are transformed to formal analysis models (to compute measures that help...
2009 / László Gönczy, István Majzik, Akos Horváth, Dániel Varró, András Balogh, et al. -
A Monoidal Category of Bifinite Chu Spaces
Abstract Chu spaces are a general framework for studying the dualities of objects and properties, points and open sets, and terms and types, under rich mathematical contexts that are relevant to several sub-disciplines of computer science and...
2008 / Fang-Ping Huang, Manfred Droste, Guo-Qiang Zhang -
A Semantical Framework for the Orchestration and Choreography of Web Services
Abstract Web Services are software services that can be advertised by providers and invoked by customers using Web technologies. This concept is currently carried further to address the composition of individual services through orchestration and...
2006 / Claus Pahl, Yaoling Zhu -
An Account of Implementing Applicative Term Rewriting
Abstract Generation of labelled transition systems from system specifications is highly dependent on efficient rewriting (or related techniques). We give an account of the implementation of two rewriters of the mCRL2 toolset. These rewriters work on ...
2007 / Muck van Weerdenburg -
Automated Construction of Reasonable Environment for Java Components
Abstract In software component verification, one of the challenges is model checking of isolated components. The environment of an isolated component is unknown, and therefore a part of an input to a model checker is missing. This problem can be...
2009 / Pavel Parizek, Jiri Adamek, Tomas Kalibera -
Policy-based Coordination in PAGODA: A Case Study
Abstract PAGODA (Policy And GOal Based Distributed Autonomy) is a modular architecture for specifying and prototyping autonomous systems. A PAGODA node (agent) interacts with its environment by sensing and affecting, driven by goals to achieve and...
2007 / Carolyn L. Talcott -
Intelligent Examination Timetabling Software
Abstract Previously, human schedulers at the Universiti Kebangsaan Malaysia (UKM) were human decision makers (BPA officer) who applied assignment procedure based on their experience with a little guidance from computer software to generate the exam...
2011 / Masri Ayob, Abdul Razak Hamdan, Salwani Abdullah, Zalinda Othman, Mohd Zakree Ahmad Nazri, et al. -
New Generation Sensor Web Enablement2011 / Arne Bröring, Johannes Echterhoff, Simon Jirka, Ingo Simonis, Thomas Everding, et al.
-
Mechanism of a Resource Location Approach in Virtual Computing Systems
Abstract We consider the problem of how to effectively locate resources in virtual computing systems, such as grid and cloud computing environments. In this paper, on the base of Kleinberg Small World model, aimed power-law characteristics, an...
2011 / Jing Li, Jianfu Li -
Mobile Cloud Computing Network Attack and Defense Learning System Based on Fuzzy Soft Sets
Abstract In this paper, we propose a new decision-making system ranking method for the virtual machine startup problems by introducing the concept of fuzzy soft sets. Then this method is used for virtual machine management by AMCCM way. It turns the ...
2013 / Ye Wang, Zengliang Liu, Zhao Du, Yong Huang