Computer and information sciences topic list of research papers
-
Quantitative projections of a quality measure: Performance of a complex task
Abstract Complex data series that arise during interaction between humans (operators) and advanced technology in a controlled and realistic setting have been explored. The purpose is to obtain quantitative measures that reflect quality in task...
2014 / K. Christensen, Gisle Kleppe, Martin Vold, Vidar Frette -
Distributed Intrusion Detection of Byzantine Attacks in Wireless Networks with Random Linear Network Coding2012 / Jen-Yeu Chen, Yi-Ying Tseng
-
Towards an Automatic Co-generator for Manycores’ Architecture and Runtime: STHORM case-study2015 / Charly Bechara, Karim Ben Chehida, Farhat Thabet
-
A Hybrid Authenticated Group Key Agreement Protocol in Wireless Sensor Networks2013 / Yue Li, Dehua Chen, Wei Li, Gaoli Wang, Paul Smith
-
A Hot-Area-Based Selfish Routing Protocol for Mobile Social Networks2013 / Haigang Gong, Xiaomin Wang
-
Simple real-time QRS detector with the MaMeMi filter
Abstract Detection of QRS complexes in ECG signals is required to determine heart rate, and it is an important step in the study of cardiac disorders. ECG signals are usually affected by noise of low and high frequency. To improve the accuracy of...
2015 / David Castells-Rufas, Jordi Carrabina -
Gender-marked Metaphors: Influence of Grammatical Gender and Animateness on Referential Choice of Metaphorical Name of the Person in the Russian Language
Abstract We explored the influence of linguistic factors on referential relatedness of metaphorical name of the person in the Russian language. The experiment demonstrated that grammatical gender is an important factor in making a metaphorical...
2014 / Zoya Rezanova, Elena Nekrasova, Konstantin Shilyaev -
Survey on Anomaly Detection using Data Mining Techniques
Abstract In the present world huge amounts of data are stored and transferred from one location to another. The data when transferred or stored is primed exposed to attack. Although various techniques or applications are available to protect data,...
2015 / Shikha Agrawal, Jitendra Agrawal -
Representing Security Specifications in UML State Machine Diagrams
Abstract Security specifications are controls and constraints on the behavior of the software and can be used to develop more secure software from the beginning. Many specification languages have been proposed to represent security specifications....
2015 / Muhammad Umair Khan -
Sentiment analysis using product review data2015 / Xing Fang, Justin Zhan
-
A Technique for Verifying Component-Based Software
Abstract Component-based software systems raise new problems for the testing community: the reuse of components suggests the possibility of reducing testing costs by reusing information about the quality of the software components. This paper...
2005 / Leonardo Mariani, Mauro Pezzè -
Design and Implementation of Visualizers for TinyOS
Abstract TinyOS is a popular event driven operating system for wireless sensor network (WSN). However TinyOS 2.x framework lacks proper visualization approach for simulator TOSSIM and also for real-time network. In this paper we present approaches...
2014 / Atrayee Gupta, Sarbani Roy -
Preface
Abstract This issue contains revised versions of selected papers presented at the 4th International Workshop on Strategies in Automated Deduction (STRATEGIES 2001). The workshop was held in conjunction with the (first) International Joint Conference ...
2005 / Maria Paola Bonacina, Bernhard Gramlich -
A Look-Ahead-Based Heuristic for Packing Spheres into a Bin: The Knapsack Case
Abstract In this work, we propose a heuristic for packing spheres into a three-dimensional bin of fixed dimensions. The objective is to maximize the volume occupied by the packed spheres. The proposed heuristic is based on a new idea that implements ...
2015 / Hakim Akeb -
A Context-based Support System of Mobile Chinese Learning for Foreigners in China
Abstract Taking advantage of the improving Mobile Web technologies, mobile language-learning systems plays an important role for self-learning, especially in the case of working people. Nevertheless, existing systems do not support learners in...
2015 / Lijun Sun, Jing Hou, Xiangpei Hu, Khalil Al-mekhlafi -
An Iterative Solution for the Coverage and Connectivity Problem in Wireless Sensor Network
Abstract We study the coverage and connectivity problem in wireless sensor networks. Given an area of targets to cover by a wireless sensor network with a coverage range for each sensor, the problem consists in minimizing the number of deployed...
2015 / Mahmud Mansour, Fethi Jarray -
Algorithms for Road Safety Based on GPS and Communications Systems WAVE
Abstract Road accidents are problems of great importance to all humanity. The objective is to develop a system, through WAVE communication, V2X, which act so as to alert the driver of collisions risk, implementing algorithms that uses data received...
2014 / Fábio Cardoso, António Serrador, Tomé Canas -
Development of Android Application for Language Studies
Abstract Mobile devices are becoming very popular nowadays. Language textbooks with learning aids on mobile devices can greatly help students with their studies. The authors have been developing learning aids on mobile devices that can be used in...
2013 / Christopher Dong, Xing Liu -
Executive functions and decision making: A managerial review
Abstract This paper provides a managerial overview of the topic of decision making under the broad area of executive functions. First a brief idea is provided about executive functions. Then, some pertinent definitions and theories of decision...
2013 / Sanjeev Swami -
User-tuned Content Customization for Children with Autism Spectrum Disorders
Abstract Autism Spectrum Disorders (ASD) are a triad of disturbances affecting the areas of communication, social interaction and behavior, and each subject has very different cognitive and functional characteristics. Especially at young ages and in ...
2014 / Margarida Lucas da Silva, Daniel Gonçalves, Hugo Silva