Computer and information sciences topic list of research papers
-
Hardware Implementation of a Spline-Based Genetic Algorithm for Embedded Stereo Vision Sensor Providing Real-Time Visual Guidance to the Visually Impaired2008 / Dah-Jye Lee, Jonathan D Anderson, James K Archibald
-
Simple Particle Swarm Optimization for Solving Beam-Slab Layout Design Problems
Abstract This study presents a particle swarm optimization (PSO) algorithm for beam-slab layout design. Design of beam-slab layouts is considered a heuristic task rather than an algorithmic task since its process cannot be written as an algorithm....
2011 / A. Nimtawat, P. Nanakorn -
Indoor robot gardening: design and implementation2010 / Nikolaus Correll, Nikos Arechiga, Adrienne Bolger, Mario Bollini, Ben Charrow, et al.
-
Generating Minimum Transitivity Constraints in P-time for Deciding Equality Logic
Abstract In a CAV'05 paper [Meir, O. and O. Strichman, Yet another decision procedure for equality logic, in: K. Etessami and S. Rajamani, editors, Proc. 17th Intl. Conference on Computer Aided Verification (CAV'05), Lect. Notes in Comp. Sci. 3576...
2008 / Mirron Rozanov, Ofer Strichman -
Divide and Congruence Applied to η-Bisimulation
Abstract We present congruence formats for η- and rooted η-bisimulation equivalence. These formats are derived using a method for decomposing modal formulas in process algebra. To decide whether a process algebra term satisfies a modal formula, one...
2006 / Wan Fokkink, Rob van Glabbeek, Paulien de Wind -
Fusing a Transformation Language with an Open Compiler
Abstract Program transformation systems provide powerful analysis and transformation frameworks as well as concise languages for language processing, but instantiating them for every subject language is an arduous task, most often resulting in...
2008 / Karl Trygve Kalleberg, Eelco Visser -
Trust-enhanced Security in Location-based Adaptive Authentication
Abstract We propose trust to enhance security in adaptive and non-intrusive user authentication in controlled and pervasive environments. In addition to who a user is (e.g., via biometrics) and what a user knows (e.g., a password, a PIN), recent...
2008 / Gabriele Lenzini, Mortaza S. Bargh, Bob Hulsebosch -
A generic model decomposition technique and its application to the Eclipse modeling framework2013 / Qin Ma, Pierre Kelsen, Christian Glodt
-
On the Performance Analysis of a Class of Transform-domain NLMS Algorithms with Gaussian Inputs and Mixture Gaussian Additive Noise Environment2010 / S. C. Chan, Y. Zhou
-
Incremental approaches for updating approximations in set-valued ordered information systems
Abstract Incremental learning is an efficient technique for knowledge discovery in a dynamic database, which enables acquiring additional knowledge from new data without forgetting prior knowledge. Rough set theory has been successfully used in...
2013 / Chuan Luo, Tianrui Li, Hongmei Chen, Dun Liu -
The Research of Safety Monitoring System Applied in School Bus Based on the Internet of Things
Abstract Internet of things (IOT) is the third wave of the world development of information industry after computer and internet. In this condition, the intelligent transportation system (ITS) comes into being. The core technology of the ITS is the...
2011 / Yaqi Xu, Rui Jiang, Shiyi Yan, Di Xiong -
An application of creating and packaging learning objects
Abstract Finding learning content is one of the problems that most learners face while developing their knowledge on the Internet. Should learning objects have special descriptive data along themselves; they could easily be found by learners. In...
2009 / Beril Ceylan, Birim Balci, Mustafa Murat Inceoğlu -
Local control of cognitive radio networks2009 / Christian Doerr, Dirk Grunwald, Douglas C. Sicker
-
Semantics by analogy for illustrative volume visualization
Abstract We present an interactive graphical approach for the explicit specification of semantics for volume visualization. This explicit and graphical specification of semantics for volumetric features allows us to visually assign meaning to both...
2011 / Moritz Gerl, Peter Rautek, Tobias Isenberg, Eduard Gröller -
Sound and Complete Axiomatization of Trace Semantics for Probabilistic Systems
Abstract We present a sound and complete axiomatization of finite complete trace semantics for generative probabilistic transition systems. Our approach is coalgebraic, which opens the door to axiomatize other types of systems. In order to prove...
2011 / Alexandra Silva, Ana Sokolova -
Feature selection on Persian fonts: A comparative analysis on GAA, GESA and GA
Abstract In This paper we compare two new optimization techniques combining Genetic Algorithm and Simulated Annealing for feature subset selection on a platform of 5000 textures of 10 different Persian fonts to obtain an optimal or near-optimal...
2011 / Tahereh Pourhabibi, Maryam Bahojb Imani, Saman Haratizadeh -
Distributed OSN Crawling System based on Ajax Simulation
Abstract In the age of Web2.0, lots of online social networks (OSNs) like Facebook, Twitter, WeiBo become the most popular information transform platform, which catch more and more attention from Information Retrieval (IR). However, traditional web...
2013 / Shan Jixi, Sha Ying, Li Yang, Xu Kai, Guo Li -
Multipath Routing Network Management Protocol for Resilient and Energy Efficient Wireless Sensor Networks
Abstract This paper proposes an optimization model for network management in multihop Wireless Sensor Networks (WSNs). Here, we develop a distributed, braided multipath algorithm to deliver the information from the information sources (targets) to...
2013 / Carlos Velásquez-Villada, Yezid Donoso -
Building Location-Aware Web with SALT and Webnear.Me
Abstract Location Based Services (LBS) belong to the most popular type of mobile applications today. Most of the content in LBS has to be created from scratch and needs to be explicitly location-tagged, which makes existing web content not directly...
2012 / Fabio Magagna, Basil Hess, Juliana Sutanto -
An Anonymous Secure Payment Protocol in a Payment Gateway Centric Model
Abstract In the last few years, a significant number of mobile payment systems have been proposed. Most of them have been based on a scenario where all the entities are directly connected to each other (formally called Full connectivity scenario)....
2012 / Jesús Téllez Isaac, Sherali Zeadally