Computer and information sciences topic list of research papers
-
A New Algorithm for Partitioned Symbolic Reachability Analysis
Abstract Binary Decision Diagrams (BDDs) and their multi-terminal extensions have shown to be very helpful for the quantitative verification of systems. Many different approaches have been proposed for deriving symbolic state graph (SG)...
2008 / Kai Lampka -
Computer Forensics Model Based on Evidence Ring and Evidence Chain
Abstract In recent years, with the development of technology, judicial practice involving electronic crime is frequent. To combat this crime, computer forensics bears the irreplaceable role. This is a combination science of law and computer, but...
2011 / Guofu Ma, Zixian Wang, Likun Zou, Qian Zhang -
Remote accessible laboratory for error controlled coding techniques with the labview software
Abstract Whilst the laboratory works at faculties providing education on the field of electronics and communication support the technical knowledge of students, they also develop their implementation abilities. The fact that there is less equipment...
2010 / Berkay Erder, Aynur Akar -
Detecting causality from online psychiatric texts using inter-sentential language patterns2012 / Jheng-Long Wu, Liang-Chih Yu, Pei-Chann Chang
-
Semi-Automatic Objects Recognition in Urban Areas Based on Fuzzy Logic2010 / Federico Prandi, Raffaella Brumana, Francesco Fassi
-
Geometric Tools in Juan De Álava’s Stonecutting Workshop2011 / José Carlos Palacios Gonzalo, Rafael Martín Talaverano
-
Stochastic Model for QoS Assessment in Multi-tier Web Services
Abstract Service Level Agreements (SLAs) are used to guarantee quality of service (QoS) between customers and service providers. In an SLA, parties establish a common set of rules and responsibilities. In this paper we propose a practical stochastic ...
2011 / Ricardo M. Czekster, Paulo Fernandes, Afonso Sales, Thais Webber, Avelino F. Zorzo -
Refinement Quantified Logics of Knowledge
Abstract Refinement quantifiers were introduced to quantify over all refinements of a model in modal logic, where a refinement is described by a simulation relation. Given the “possible worlds” interpretation of modal logic, a refinement corresponds ...
2011 / James Hales, Tim French, Rowan Davies -
Password management diffuculties in system and network management
Abstract In this paper, password management problems of network and system management will be handled. In this concept, password management and its usage in systems and networks will be introduced. Then password management problems that occurs in...
2011 / Temuçin Huseyin, Erzurumlu Kerem -
A Dynamic Multi-Objective Optimization Framework for Selecting Distributed Deployments in a Heterogeneous Environment
Abstract In distributed systems, where several deployments of a specific service exist, it is a crucial task to select and combine concrete deployments to build an executable workflow. Non-functional properties such as performance and availability...
2011 / Elisabeth Vinek, Peter Paul Beran, Erich Schikuta -
A hybrid multi-path routing algorithm for industrial wireless mesh networks2013 / Yun Zuo, Zhihao Ling, Yifeng Yuan
-
Computing multiple zeros using a class of quartically convergent methods
Abstract Targeting a new multiple zero finder, in this paper, we suggest an efficient two-point class of methods, when the multiplicity of the root is known. The theoretical aspects are investigated and show that each member of the contributed class ...
2013 / F. Soleymani, D.K.R. Babajee -
Code Generation and Optimization of Distributed-memory Dense Linear Algebra Kernels
Abstract Design by Transformation (DxT) is an approach to software development that encodes domain-specific programs as graphs and expert design knowledge as graph transformations. The goal of DxT is to mechanize the generation ...
2013 / Bryan Marker, Don Batory, Robert van de Geijn -
New Parallel Sphere Detector Algorithm Providing High-Throughput for Optimal MIMO Detection
Abstract Multiple–input multiple-output (MIMO) detection techniques can vary significantly in complexity and detection performance. Finding the optimal Maximum Likelihood (ML) solution with high throughput was limited by the computational...
2013 / Csaba M. Józsa, Géza Kolumbán, Antonio M. Vidal, Francisco-José Martínez-Zaldívar, Alberto González -
Interactive Molecular Dynamics: Scaling up to Large Systems
Abstract Combining molecular dynamics simulations with user interaction would have various applications in both education and re- search. By enabling interactivity the scientist will be able to visualize the experiment in real time and drive the...
2013 / Matthieu Dreher, Marc Piuzzi, Ahmed Turki, Matthieu Chavent, Marc Baaden, et al. -
Performance Analysis of Iterative Solvers of Linear Equations for Hp-adaptive Finite Element Method
Abstract The paper presents performance considerations for Krylov space iterative solvers used in hp-adaptive finite element codes. The design of optimal data structures and algorithms in terms of memory requirements and computing efficiency is...
2013 / Przemysław Płaszewski, Krzysztof Banaś -
Enhancing Mentoring Between Alumni and Students via Smart Alumni System
Abstract Alumni are one of the most important assets to any university. They are the people who represent the university in the real world. University alumni systems exist to promote active and ongoing relationships between graduates and their alma...
2012 / Hongmei Chi, Edward L. Jones, Lakshmi P. Grandham -
A Mobile Learning Support System for Ubiquitous Learning Environments
Abstract This paper proposes a Mobile Learning Support System (MLSS) which enables students to access learning materials by utilizing 2D barcodes and GPS technology. As the pilot system of ubiquitous learning, we used camera-equipped mobile phones...
2013 / Kai-Yi Chin, Yen-Lin Chen -
Early detection and monitoring of forest fire with a wireless sensor network system
Abstract This work presents a low-rate wireless personal area network-based sensor network for early detection and monitoring of forest fires. The system has been designed to perform different parameter measurements at different tree heights,...
2010 / A. Bayo, D. Antolín, N. Medrano, B. Calvo, S. Celma -
Improving the Security of CardSpace2009 / Waleed A. Alrodhan, Chris J. Mitchell