Computer and information sciences topic list of research papers
-
Lazy Strong Normalization
Abstract Among all the reduction strategies for the untyped λ-calculus, the so called lazy β-evaluation is of particular interest due to its large applicability to functional programming languages (e.g. Haskell [Bird, R., “Introduction to Functional ...
2005 / Luca Paolini, Elaine Pimentel, Simona Ronchi Della Rocca -
Using Off-the-Shelf Formal Methods to Verify Attribute Grammar Properties
Abstract Attribute Grammars are the specification language of many tools that automatically generate programming language implementations. We consider the problem of verifying properties of attribute grammar specifications, particularly properties...
2004 / Shirley Goldrei, Anthony Sloane -
The Complexity of Random Ordered Structures
Abstract We show that for random bit strings, U p ( n ) ...
2005 / Joel H. Spencer, Katherine St. John -
Deduction and Presentation in ρLog
Abstract We describe the deductive and proof presentation capabilities of a rule-based system implemented in Mathematica. The system can compute proof objects, which are internal representations of deduction derivations which respect a specification ...
2004 / Mircea Marin, Florina Piroi -
Making the Unobservable, Unobservable
Abstract Behavioural equivalences of various calculi for modelling distributed systems differ significantly because the properties which can be observed through interaction depend heavily upon their mode of communication. A typical approach to...
2009 / Julian Rathke, Paweł Sobociński -
Specification and Analysis of SOC Systems Using COWS: A Finance Case Study
Abstract Service-oriented computing, an emerging paradigm for distributed computing based on the use of services, is calling for the development of tools and techniques to build safe and trustworthy systems, and to analyse their behaviour. Therefore ...
2009 / Federico Banti, Alessandro Lapadula, Rosario Pugliese, Francesco Tiezzi -
Analyzing the Uses of a Software Modeling Tool
Abstract While a lot of progress has been made in improving analyses and tools that aid software development, less effort has been spent on studying how such tools are commonly used in practice. A study into a tool's usage is important not only...
2006 / Xiaoming Li, Daryl Shannon, Jabari Walker, Sarfraz Khurshid, Darko Marinov -
Informatic vs. Classical Differentiation on the Real Line2004 / Keye Martin, Joël Ouaknine
-
LSC Verification for UML Models with Unbounded Creation and Destruction
Abstract The approaches to automatic formal verification of UML models known up to now require a finite bound on the number of objects existing at each point in time. In [W. Damm, B. Westphal, Live and let die: LSC-based verification of UML-models,...
2006 / Bernd Westphal -
On Formal Specification of Software Components and Systems
Abstract Reasoning about software systems developed using components begins with component-level specifications, from which system-level specifications are derived. While sound compositional reasoning is a strength of formal specification methods,...
2006 / Sharon Flynn, Dick Hamlet -
Event Structure Spans for Nondeterministic Dataflow
Abstract A compositional semantics for nondeterministic dataflow processes is described using spans of event structures; such a span describes a computation between datatypes, themselves represented by event structures, as itself an event structure. ...
2007 / Lucy Saunders-Evans, Glynn Winskel -
State Based Robustness Testing for Components
Abstract Component based development allows to build software upon existing components and promises to improve software reuse and reduce costs. To gain reliability of a component based system, verification technologies such as testing can be applied ...
2009 / Bin Lei, Zhiming Liu, Charles Morisset, Xuandong Li -
Adaptation of foreign accented speakers in native Arabic ASR systems
Abstract This paper addresses the adaptation of Arabic speech recognition (ASR) systems to foreign accented speakers. This adaptation is accomplished by using the adaptation techniques; namely, the Maximum Likelihood Linear Regression (MLLR), the...
2011 / Sid-Ahmed Selouani, Yousef Ajami Alotaibi -
Evaluation of design pattern recovery tools
Abstract Design pattern recovery approaches are assisted by different tools which recognize patterns from source code of legacy applications. Several tools are presented in related work, but little attention is paid on the evaluation of tools due to ...
2011 / Ghulam Rasool, Patrick Maeder, Ilka Philippow -
The Collage Authoring Environment
Abstract The Collage Authoring Environment is a software infrastructure which enables domain scientists to collaboratively develop and publish their work in the form of executable papers. It corresponds to the recent developments in both e-Science...
2011 / Piotr Nowakowski, Eryk Ciepiela, Daniel Harężlak, Joanna Kocot, Marek Kasztelnik, et al. -
A recommender system based on interactive evolutionary computation with data grouping
Abstract Nowadays, recommender systems are widely applied in e-commerce websites to help customers in finding the items they want. A recommender system should be able to provide users with useful information about the items that might be interesting ...
2011 / Hyun-Tae Kim, Jong-Hyun Lee, Chang Wook Ahn -
Transitive-based object-oriented lack-of-cohesion metric
Abstract Classes are the basic units in object-oriented programs. Therefore, the quality of a class has a great impact on the overall quality of the software. Class cohesion is one of the important quality factors and it refers to the degree of...
2011 / Jehad Al Dallal -
Biomedical and bioinformatics challenges to computer science
Abstract This is the third edition of the workshop on Biomedical and Bioinformatics Challenges to Computer Science. The purpose of the workshop series is to bring together scientists from computer science and life sciences, to discuss current...
2010 / Mario Cannataro, Rodrigo Weber dos Santos, Joakim Sundnes -
Infrastructure planning and topology optimization for reliable mobile big data transmission under cloud radio access networks2016 / Xiang Hou, Bin Lin, Rongxi He, Xudong Wang
-
Overview on Selective Encryption of Image and Video: Challenges and Perspectives2009 / A. Massoudi, F. Lefebvre, C. De Vleeschouwer, B. Macq, J.-J. Quisquater