Computer and information sciences topic list of research papers
-
New spatial clustering-based models for optimal urban facility location considering geographical obstacles2014 / Maryam Javadi, Jamal Shahrabi
-
A Join Algorithm for Large Databases: A Quadtrees Structure Approach
Abstract Enhancing the performance of large database systems depends heavily on the cost of performing join operations. When two very large tables are joined, optimizing such operation is considered one of the interesting research topics to many...
2013 / Hatim A. Aboalsamh -
On Equators in Asynchronous Name-passing Calculi without Matching – Extended Abstract –
Abstract We give a labeled characterization of barbed congruence in asynchronous π-calculus, which, unlike previous characterizations, does not use the matching construct. In absence of matching the observer cannot directly distinguish two names. In ...
2005 / Massimo Merro -
Active Oberon for .NET: An Exercise in Object Model Mapping
Abstract Active Oberon is a substantial evolution of the programming language Oberon. It distinguishes itself by a novel object model and by its integration into the .NET language interoperability framework. ...
2005 / Jürg Gutknecht -
Coalgebras and Modal Logic
Abstract Coalgebras are of growing importance in theoretical computer science. To develop languages for them is significant for the specification and verification of systems. Modal logic has proved to be suitable for this purpose. So far, most...
2005 / Martin Rößiger -
Preface
Abstract This volume contains the Proceedings of SEGRAGRA'95, the Joint COMPUGRAPH/SEMAGRAPH Workshop on Graph Rewriting and Computation. The Workshop was held in the “Centro Studi Santa Maria Maddalena” of Volterra, near Pisa, Italy, from August 28 ...
2005 / Andrea Corradini Ugo, Montanari -
The simply typed rewriting calculus
Abstract The rewriting calculus is a rule construction and application framework. As such it embeds in a uniform way term rewriting and lambda-calculus. Since rule application is an explicit object of the calculus, it allows us also to handle the...
2005 / Horatiu Cirstea, Claude Kirchner -
Parametric Polymorphism and Operational Equivalence (Preliminary Version)
Abstract Studies of the mathematical properties of impredicatively polymorphic types have for the most part focused on the polymorphic lambda calculus of Girard-Reynolds, which is a calculus of total polymorphic functions. This paper considers...
2005 / Andrew M. Pitts -
Deriving Bisimulation Congruences: A 2-categorical Approach
Abstract We introduce G-relative-pushouts (GRPO) which are a 2-categorical generalisation of relative-pushouts (RPO). They are suitable for deriving labelled transition systems (LTS) for process calculi where terms are viewed modulo structural...
2005 / Vladimiro Sassone, Pawel Sobociński -
Combinational Circuit Synthesis with Time and Component Bounds2007 / Shyh-Ching Chen, Kuck
-
Higher-Order Types and Meta-Programming for Global Computing
Abstract MetaKlaim is a case study in modeling the spatial, temporal and security aspects necessary for global computing. MetaKlaim integrates MetaML (an extension of SML for multi-stage programming) and Klaim (à Kernel Language for Agents...
2004 / G. Ferrari, E. Moggi, R. Pugliese -
Typed behavioural equivalences for processes in the presence of subtyping
Abstract We study typed behavioural equivalences for the π-calculus, in which the type system allows a form of subtyping. This enables processes to selectively distribute different capabilities on communication channels. The...
2004 / Matthew Hennessy, Julian Rathke -
Exploitation of Query Sentences Using Specific Weighting in Support-sentence Retrieval
Abstract Our goal is to develop a support-sentence retrieval system that retrieves sentences relevant to a given theme and then, classifies them into relevant types, such as agreement, contradiction, refinement, and supplement. This paper focuses on ...
2013 / Hai-Minh Nguyen, Kiyoaki Shirai -
Big Data Security Issues Based on Quantum Cryptography and Privacy with Authentication for Mobile Data Center
Abstract Enhancement of security and privacy in mobile data centers is challengeable with efficient security key management. In order to solve this problem, data centers need efficient quantum cryptography using Grover's algorithm and authentication ...
2015 / Vijey Thayananthan, Aiiad Albeshri -
Dendrogram Based Algorithm for Dominated Graph Flooding
Abstract In this paper, we are concerned with the problem of flooding undirected weighted graphs un- der ceiling constraints. We provide a new algorithm based on a hierarchical structure called dendrogram, which offers the significant advantage that ...
2014 / Claude Tadonki, Fernand Meyer, François Irigoin -
A Novel Analytical Model for Provisioning QoS in Body Area Sensor Networks
Abstract Wireless Body Area Network (WBAN) has been an active area of research over the past few years due to its tremendous benefits particularly related to healthcare systems. The available research to evolve the QoS in WBAN is immature due to...
2014 / Mohsin Iftikhar, Iftikhar Ahmad -
A Comparison of Three QRS Detection Algorithms Over a Public Database
Abstract We have compared three of the best QRS detection algorithms, regarding their results, to check the performance and to elucidate which get better accuracy. In the literature these algorithms were published in a theoretical way, without...
2014 / Raúl Alonso Álvarez, Arturo J. Méndez Penín, X. Antón Vila Sobrino -
Connecting Wireless Sensor Networks to the Robot Operating System
Abstract Robot systems largely depend on embedded systems to operate. The interfaces of those embedded systems, e.g. motor controllers or laser scanners, are often vendor-specific and therefore require a component that translates from/to the Robot...
2013 / Philipp M. Scholl, Brahim El Majoub, Silvia Santini, Kristof Van Laerhoven -
Reliability Analysis of Aircraft Condition Monitoring Network Using an Enhanced BDD Algorithm
Abstract The aircraft condition monitoring network is responsible for collecting the status of each component in aircraft. The reliability of this network has a significant effect on safety of the aircraft. The aircraft condition monitoring network...
2012 / Changxiao ZHAO, Yao CHEN, Hailiang WANG, Huagang XIONG -
Heuristics for Minimum Spanning K-tree Problem
Abstract In this paper we consider the problem of finding a spanning k-tree of minimum weight in a complete weighted graph which has a number of applications in designing reliable telecommunication networks. This problem is known to be NP-hard. We...
2014 / Roman E. Shangin, Panos M. Pardalos