Computer and information sciences topic list of research papers
-
Hierarchical Key Management Scheme for Securing Mobile Agents with Optimal Computation Time
Abstract The Mobile agents are well suited for accessing contents of distributed web based applications including internet business. Such kinds of access must be secure enough enabling only authorized mobile agents to retrieve the contents from the...
2012 / P. Vijayakumar, K. Anand, S. Bose, V. Maheswari, R.Kowsalya, et al. -
Digital Image Steganography using Dithering Technique
Abstract Steganography refers to the science of “invisible” communication. Unlike cryptography, where the goal is to secure communications from an eavesdropper, steganographic techniques strive to hide the very presence of the message itself from an ...
2012 / D. Biswas, S. Biswas, A. Majumder, D. Sarkar, D. Sinha, et al. -
Real Time Gesture Recognition System for Interaction in Dynamic Environment
Abstract Human Computer Interaction techniques have become a bottleneck in the effective utilization of the available information flow. The development of user interfaces influences the changes in the Human-Computer Interaction (HCI). Human hand...
2012 / Siddharth S. Rautaray, Anupam Agrawal -
Application of Fuzzy Clustering on Software Quality using Max-min Method
Abstract Fuzzy clustering analysis is a decision approach, makes fuzzy equivalent relation to classify objects into different clusters according to some criterion. In this paper it is applied in the clustering of software quality using the following ...
2012 / Jaya Pal, Vandana Bhattacherjee -
A Note On the Turing Degrees of Divergence Bounded Computable Reals
Abstract The Turing degree of a real number is defined as the Turing degree of its binary expansion. In this note we apply the double witnesses technique recently developed by Downey, Wu and Zheng [R. Downey, G. Wu, and X. Zheng. Degrees of d.c.e....
2005 / Xizhong Zheng, Robert Rettinger -
An Abstract Interpretation-based Approach to Mobile Code Safety
Abstract Recent approaches to mobile code safety, like proof-carrying code, involve associating safety information to programs. The code supplier provides a program and also includes with it a certificate (or proof) whose validity entails compliance ...
2005 / Elvira Albert, Germán Puebla, Manuel Hermenegildo -
A Novel EMD based Watermarking of Fingerprint Biometric Using GEP
Abstract Watermarking with biometrics has been proposed as a line of defense in the protection of IPR and DRM. Robust watermarking of biometric information of the user in the host data may be used for this purpose. Fingerprints are the most popular...
2014 / Anil Kumar Shaw, Swanirbhar Majumder, Souvik Sarkar, Subir Kumar Sarkar -
Generation and Analysis of Attack Graphs
Abstract An integral part of modeling the global view of network security is constructing attack graphs. Construction by hand, however, is tedious, error prone, and impractical for attack graphs larger than a hundred nodes. In this paper we present...
2012 / Chunying Wang, Ning Du, Huijing Yang -
Low frequency amplifier and oscillator using simulated inductor
Abstract The low frequency tuned amplifiers as well as oscillators are very difficult to design because the size of inductor becomes very large. It is impossible to realize such a large value of inductor practically. This paper presents an alternate ...
2012 / D. Susan, S. Jayalalitha -
Character Segmentation System Based on C# Design and Implementation
Abstract At present, most of the OCR recognizing through individual character, thus the quality of character segmentation is the key point to affect the quality of OCR recognition system. This paper introduces the formula of projective method in...
2012 / Zekai Zheng, Jingying Zhao, Hai Guo, Luping Yang, Xueai Yu, et al. -
On sire evaluation with uncertain paternity2009 / JL Foulley, R Thompson, D Gianola
-
Applying CP(F D), CLP(F D) and CFLP(F D) to a Real-life Employee Timetabling Problem
Abstract This paper presents a case study based on a real-life Employee Timetabling Problem, formulating it and then making a com- parison of its modeling and solution with three different programming paradigms embedding Finite Domain constraint...
2013 / Ignacio Castiñeiras, Fernando Sáenz-Pérez -
Distributed Multiscale Computations Using the MAPPER Framework
Abstract We present a global overview of the methodology developed within the MAPPER European project to design, implement and run a multiscale simulation on a distributed supercomputing infrastructure. Our goal is to highlight the main steps...
2013 / Mohamed Ben Belgacem, Bastien Chopard, Joris Borgdorff, Mariusz Mamoński, Katarzyna Rycerz, et al. -
A novel variable-lag probability hypothesis density smoother for multi-target tracking
Abstract It is understood that the forward–backward probability hypothesis density (PHD) smoothing algorithms proposed recently can significantly improve state estimation of targets. However, our analyses in this paper show that they cannot give a...
2013 / Yue Li, Jianqiu Zhang, Jianjun Yin -
A study on the impact of AL-FEC techniques on TV over IP Quality of Experience2011 / Federica Battisti, Marco Carli, Elena Mammi, Alessandro Neri
-
GeoDTN+Nav: Geographic DTN Routing with Navigator Prediction for Urban Vehicular Environments2009 / Pei-Chun Cheng, Kevin C. Lee, Mario Gerla, Jérôme Härri
-
Long-term solar activity and terrestrial connections. Part I: theory2005 / N. D. Diamantides
-
A Robust and Efficient Cross-Layer Optimal Design in Wireless Sensor Networks2013 / Mingwei Li, Yuanwei Jing, Chengtie Li
-
Eye-blink detection system for human–computer interaction2011 / Aleksandra Królak, Paweł Strumiłło
-
A hybrid keyword and patent class methodology for selecting relevant sets of patents for a technological field2012 / Christopher L. Benson, Christopher L. Magee