Computer and information sciences topic list of research papers
-
Digital Philology in Audio Long-term Preservation: A Multidisciplinary Project on Experimental Music
Abstract This paper presents the methodology of a multidisciplinary project aimed at the preservation of the audio collection of the Centro Studi Luciano Berio, coordinated by and carried out at the laboratory for audio preservation and restoration...
2014 / Federica Bressan, Sergio Canazza -
Co-operation in the Parallel Memetic Algorithm2014 / Jakub Nalepa, Miroslaw Blocho
-
The Concept of Knowledge Society in the Ontology of Modern Society
Abstract The article analyzes the nature of knowledge society. Research opportunities of instrumental reason (M.Horkheimer) and communicative reason (J.Habermas) concepts are compared. Theories of postindustrial society, information society and...
2015 / Anna A. Kornienko -
Knowledge and Information in Nutrition Software Design
Abstract The intension of this paper is to point out that both Knowledge and Information can be persisted within ordinary database management systems. It is a well-known demand for codifying the knowledge versus of embedding it inside the business...
2014 / Nikitas N. Karanikolas -
Physical key-protected one-time pad2013 / Roarke Horstmeyer, Benjamin Judkewitz, Ivo M. Vellekoop, Sid Assawaworrarit, Changhuei Yang
-
Enhancing Security in Cloud Using Trusted Monitoring Framework
Abstract Cloud computing is a technology that provides network based services on demand. Cloud computing technology provides advantages to end users and business organizations. Few notable advantages are cost efficiency, increased storage capacity,...
2015 / M. Arun Fera, C. manikandaprabhu, Ilakiya Natarajan, K. Brinda, R. Darathiprincy -
Implementation, Comparison, and Enhancement of Secure Communication Designs
Abstract Cryptography offers effective techniques to ensure users’ security and privacy in an efficient way. To protect networks from intruders/attackers and transmit a message over an insecure channel, encryption and digital signature algorithms...
2014 / Aya Elshobaky, Ghada Elkabbany, Mohamed Rasslan, Shawkat Gurguis -
Noncontiguous Pattern Containment in Binary Trees2014 / Lara Pudwell, Connor Scholten, Tyler Schrock, Alexa Serrato
-
Entropy Methods in Guided Self-Organisation2014 / Mikhail Prokopenko, Carlos Gershenson
-
Parallel selective sampling method for imbalanced and large data classification
Abstract Several applications aim to identify rare events from very large data sets. Classification algorithms may present great limitations on large data sets and show a performance degradation due to class imbalance. Many solutions have been...
2015 / Annarita D’Addabbo, Rosalia Maglietta -
Process Mining for Individualized Behavior Modeling Using Wireless Tracking in Nursing Homes2013 / Carlos Fernández-Llatas, José-Miguel Benedi, Juan García-Gómez, Vicente Traver
-
A Study of Improved Approaches for TCP Congestion Control in Ad Hoc Networks
Abstract The conventional TCP was designed to wired networks on the assumption that the loss of data packet caused by network congestion, but in ad hoc networks, a large number of data packet loss due to high BER(bits error rate), nodes mobility,...
2012 / Yanping Teng, Haizhen Wang, Mei Jing, Zuozheng Lian -
User Interest Modeling and Self-Adaptive Update Using Relevance Feedback Technology
Abstract User interest modeling is the core component of personalized service system. To improve the accuracy of the resulting model, this paper presents a method for modeling user's interest by collecting information of interactive behaviors and...
2012 / Yi Zhu, Li He, Xiaojun Wang -
Validating distance decay through agent based modeling2013 / Arvind Verma, Ramyaa Ramyaa, Suresh Marru
-
Research on Supply Chain Collboration of Auto Industry Engineering Based on BTO
Abstract BTO supply chain in the application of automobile industry is a trend in the future. But the effective implementation is still a problem. The paper expounds on the application and research status and the key problems of BTO production model ...
2012 / Li Chilin, You Li -
An improvement of DV-Hop localization algorithm for wireless sensor networks2013 / Yu Hu, Xuemei Li
-
Using RDF Data as Basis for 3D Window Management in Mobile Devices
Abstract Computer users are commonly familiar with the WIMP (Windows, Icons, Menus and Pointing device) paradigm that has been the dominant design for decades. Despite its common use, the WIMP paradigm has a fundamental problem: it clutters the...
2011 / Antti Peuhkurinen, Tommi Mikkonen, Mikko Terho -
Scriptable web applications as first-class citizens
Abstract Mashups that combine data from numerous web sites into an integrated experience have rapidly become state-of-the-practice way to develop new compelling applications. However, their use has been somewhat restricted, since it is common that...
2011 / Tommi Mikkonen, Mikko Terho, Mikko Kuusipalo, Pekka Reijula -
A Robust Neural Fuzzy Petri Net Controller For A Temperature Control System
Abstract Temperature control systems have the characteristics of non-linearity, large inertia, and time variance. It is difficult to overcome the effects of these factors and get a reasonable results with the use of conventional controllers such as...
2011 / Ali A. Abed, Abdul Adhem A. Ali, Nauman Aslam, Ali F. Marhoon -
An Ant Colony Clustering Algorithm Improved from ATTA
Abstract DENNEUBOURG presents the first ant-based clustering algorithm in 1991.Ant colony clustering has the characteristics of automatically clustering, high clustering accuracy, irregular cluster shapes and so on. These are important for a...
2012 / Jinbiao Wang, Ailing Tu, Hongwei Huang