Computer and information sciences topic list of research papers
-
Manta Matcher: automated photographic identification of manta rays using keypoint features2013 / Christopher Town, Andrea Marshall, Nutthaporn Sethasathien
-
Structural Complexity Assessment: A Design and Management Tool for Supply Chain Optimization
Abstract Nowadays, competitiveness of supply chain companies is not just about optimizing supply chains within functions, but supply chains have to be optimized across functional elements as well. At this time, there are known several structural...
2012 / V. Modrak, P. Semanco -
Modeling and Control of Networked Systems with Different Loop Topologies
Abstract In this paper, modeling and control of networked control system with different loop topology structures are considered. The indeterminate time-delay is known to the controller node by using time-stamping and introducing buffers for...
2011 / Wang Zhiwen, Zhou Li, Luo Dongsong -
Audit tool for Efficient Logistics Policy
Abstract The paper is presenting a new approach to policy-making in the field of logistics, which has been developed within the CASTLE project. It gives an example of a policy tool for the auditing of logistics and materials management processes and ...
2012 / Stane Božičnik, Tomislav Letnik, Mitja Štiglic -
A Methodology for the Performance Evaluation of Inertial Measurement Units2012 / Salvatore Sessa, Massimiliano Zecca, Zhuohua Lin, Luca Bartolomeo, Hiroyuki Ishii, et al.
-
Impossibility Results in the Equational Logic of Processes
Abstract This talk offers a survey of negative results on the existence of finite equational axiomatizations for bisimulation equivalence over fragments of algebraic process calculi.
2007 / Luca Aceto -
From Message Exchanges to Communicative Acts to Commitments
Abstract Our research aims at providing an alternative model of agent communication to the one proposed by the Foundation for Intelligent Physical Agents (FIPA). We adopt the mainstream perspective that views agent communication as the performance...
2006 / Mario Verdicchio, Marco Colombetti -
Completion after Program Inversion of Injective Functions
Abstract Given a constructor term rewriting system that defines injective functions, the inversion compiler proposed by Nishida, Sakai and Sakabe generates a conditional term rewriting system that defines the inverse relations of the injective...
2009 / Naoki Nishida, Masahiko Sakai -
A Type-Safe Embedding of XDuce into ML
Abstract We consider the problem of integrating XDuce into ML. This is difficult because of incompatible type and value representations. Our solution is a type-driven translation scheme from XDuce to ML based on a structured representation of XDuce...
2006 / Martin Sulzmann, Kenny Zhuo Ming Lu -
Propositional Logic as a Propositional Fuzzy Logic
Abstract There are several ways to extend the classical logical connectives for fuzzy truth degrees, in such a way that their behavior for the values 0 and 1 work exactly as in the classical one. For each extension of logical connectives the...
2005 / Benjamín René Callejas Bedregal, Anderson Paiva Cruz -
Rijndael for Sensor Networks: Is Speed the Main Issue?
Abstract We present an implementation of Rijndael for wireless sensor networks running on Eyes sensor nodes. In previous works, Rijndael has not been considered a suitable encryption algorithm for sensor nodes because it is too slow and requires a...
2007 / Andrea Vitaletti, Gianni Palombizio -
Algorithmic Debugging of Java Programs
Abstract In this paper we propose applying the ideas of declarative debugging to the object-oriented language Java as an alternative to traditional trace debuggers used in imperative languages. The declarative debugger builds a suitable computation...
2007 / R. Caballero, C. Hermanns, H. Kuchen -
Rewriting Interpolants
Abstract We give a method of constructing an interpolant for linear equality, and inequality constraints over the rational numbers. Our method is based on efficient rewriting techniques, and does not require the use of combination methods. The...
2008 / Christopher Lynch, Yuefeng Tang -
Rewrite Based Specification of Access Control Policies
Abstract Data protection within information systems is one of the main concerns in computer systems security and different access control policies can be used to specify the access requests that should be granted or denied. These access control...
2009 / Horatiu Cirstea, Pierre-Etienne Moreau, Anderson Santana de Oliveira -
Dominance Measuring Method Performance under Incomplete Information about Weights2012 / Alfonso Mateos, Antonio Jiménez, José F. Blanco
-
A Deterministic Annealing Algorithm for a Bi-Objective Full Truckload Vehicle Routing Problem in Drayage Operations
Abstract Drayage operations involve transporting loaded and empty containers in the hinterland of a port. In this paper a full truckload vehicle routing problem in drayage operations is studied. Either the origin or destination of empty container...
2011 / Kris Braekers, An Caris, Gerrit K. Janssens -
Using GIS for Linguistic Study: A Case of Dialect Change in the Northeastern Region of Thailand
Abstract While spatial thinking is the main concern for all disciplines involving the study of distributed phenomenon in space and over time, lack of spatial abilities and knowledge in handling spatial data appears to be one of the weakest points of ...
2011 / Sirivilai Teerarojanarat, Kalaya Tingsabadh -
Association Rules Mining with Multiple Constraints
Abstract Association rules mining(ARM) is an important task in the field of data mining, mining frequent itemsets is a key step of many algorithms for ARM. In a very large dataset, rules generated may be very large, but some of them are useless to...
2011 / Li Guang-yuan, Cao Dan-yang, Guo Jian-wei -
Cryptanalysis of an efficient password-based group key agreement protocol
Abstract Password-based group key agreement protocols are fundamental component of the communications systems. In 2009, Zheng et al. proposed an efficient and provably secure password-based agreement protocol and declared their protocol is secure in ...
2011 / Wei Yuan, Liang Hu, Hongtu Li, Jianfeng Chu -
Interleaved Processing of Bit-Flipping Decoding For LDPC Codes
Abstract The BF decoding algorithm for LDPC codes is simple. However, if the number of burst errors is bigger than which BF algorithm can process, the decoding may fail. Interleaving technology is a kind of effective techniques to handle burst...
2011 / Qiao Guolei