Computer and information sciences topic list of research papers
-
Heart Health Risk Assessment System: A Nonintrusive Proposal Using Ontologies and Expert Rules2014 / Teresa Garcia-Valverde, Andrés Muñoz, Francisco Arcas, Andrés Bueno-Crespo, Alberto Caballero
-
JAUS to EtherCAT Bridge: Toward Real-Time and Deterministic Joint Architecture for Unmanned Systems2014 / Jie Sheng, Sam Chung, Leo Hansel, Don McLane, Joel Morrah, et al.
-
A Novel Approach of Rough Conditional Entropy-Based Attribute Selection for Incomplete Decision System2014 / Tao Yan, Chongzhao Han
-
Word sense disambiguation for event trigger word detection in biomedicine2011 / David Martinez, Timothy Baldwin
-
SProt: sphere-based protein structure similarity algorithm2011 / Jakub Galgonek, David Hoksza, Tomáš Skopal
-
OTO: Ontology Term Organizer2015 / Fengqiong Huang, James A Macklin, Hong Cui, Heather A Cole, Lorena Endara
-
A Minimum Cost Handover Algorithm for Mobile Satellite Networks
Abstract For mobile satellite networks, an appropriate handover scheme should be devised to shorten handover delay with optimized application of network resources. By introducing the handover cost model of service, this article proposes a rerouting...
2008 / Zhang Tao, Zhang Jun -
Formal Methods in Practice
Abstract Technology transfer from academic research to industrial practice is hampered by social, political and economic problems more that by technical issues. This paper describes one instance of successful technology transfer based on a...
2004 / Wolfgang Polak -
On-line learning from streaming data with delayed attributes: a comparison of classifiers and strategies2010 / Mónica Millán-Giraldo, J. Salvador Sánchez, V. Javier Traver
-
Block Access Token Renewal Scheme Based on Secret Sharing in Apache Hadoop2014 / Su-Hyun Kim, Im-Yeong Lee
-
The Application of MATLAB in Communication Theory
Abstract This article explores the principles of MATLAB in the teaching of communication theory, through designing the friendly user interfaces to understand the complex computing process by the way of intuitive graphic. It covers the sources range...
2012 / Liu Guangpu, Gao Yuchun -
An adaptive distribute routing strategy control for Publish/Subscribe systems
Abstract Distributed event routing has emerged as one of core functions for the publish/subscribe systems. Aiming at the requirement of loosely-coupled, high-performance, massively scalable network architecture, an adaptive distribute routing...
2011 / Xiwei Feng, Yongpan Zhang, Cang Guan, Jianhua Wang -
Studying the co-evolution of production and test code in open source and industrial developer test processes through repository mining2010 / Andy Zaidman, Bart Van Rompaey, Arie van Deursen, Serge Demeyer
-
Absent words and the (dis)similarity analysis of DNA sequences: an experimental study2016 / Mohammad Saifur Rahman, Ali Alatabbi, Tanver Athar, Maxime Crochemore, M. Sohel Rahman
-
Promoting computer assisted learning for persons with disabilities
Abstract This paper highlights the necessity to respect international accessibility and e-learning standards in creating Web sites or assistive software and provides solutions for access to learning objects, through web services using voice...
2010 / Narcisa Isaila, Irina Nicolau -
Predicting Movie Prices Through Dynamic Social Network Analysis
Abstract This paper explores the effectiveness of social network analysis and sentiment analysis in predicting trends. Our research focuses on predicting the success of new movies over their first four weeks in the box office after opening....
2010 / Lyric Doshi, Jonas Krauss, Stefan Nann, Peter Gloor -
Joint DOD/DOA estimation in MIMO radar exploiting time-frequency signal representations2012 / Yimin D Zhang, Moeness G Amin, Braham Himed
-
Towards Improving Query Performance of Web Feature Services (WFS) for Disaster Response2013 / Chuanrong Zhang, Tian Zhao, Weidong Li
-
MR-Radix: a multi-relational data mining algorithm2012 / Carlos R Valencio, Fernando T Oyama, Paulo Scarpelini, Angelo C Colombini, Adriano M Cansian, et al.
-
Two Factor Authentication for Secured Login Using Array Password Engender by Petri net
Abstract In the most recent decades, the amount of web-based users has increased dramatically. However information and network security is a challenging issue for web users and service providers. Different authentication methods have been proposed...
2015 / S. Vaithyasubramanian, A. Christy, D. Lalitha