Computer and information sciences topic list of research papers
-
A Distributed Simulation Schedule Strategy Based on Synchronous Startup
Abstract A notion of logic time and logic time stamp is introduced to control running order for single-period and multi-periods simulation system. The schedule strategy for synchronous startup is designed. The technology essential and implementation ...
2011 / Zhipeng Shen, Yuting Wang, Chen Guo -
Performance comparison of designated preprocessing white light interferometry algorithms on emerging multi- and many-core architectures
Abstract Parallel computing has been a niche for scientific research in academia for decades. However, as common industrial applications become more and more performance demanding and raising the clock frequency of conventional single-core systems...
2011 / Max Schneider, Dietmar Fey, Daniel Kapusi, Torsten Machleidt -
LDPC and SHA based iris recognition for image authentication
Abstract We introduce a novel way to authenticate an image using Low Density Parity Check (LDPC) and Secure Hash Algorithm (SHA) based iris recognition method with reversible watermarking scheme, which is based on Integer Wavelet Transform (IWT) and ...
2012 / K. Seetharaman, R. Ragupathy -
Reliability analysis of 220kV power transformers in Egypt
Abstract In this paper, outage data analysis of 220kV power transformers is considered. Outage-data are obtained from the Egyptian Electricity Transmission Company. Outage-data analysis over 8years from 2002 to 2009 of 252 transformers with MVA...
2011 / M. Abdelfatah, M. EL-Shimy, H.M. Ismail -
The Wavelet and Fourier Transforms in Feature Extraction for Text-Dependent, Filterbank-Based Speaker Recognition
Abstract An important step in speaker recognition is extracting features from raw speech that captures the unique characteristics of each speaker. The most widely used method of obtaining these features is the filterbank-based Mel Frequency Cepstral ...
2011 / Claude Turner, Anthony Joseph, Murat Aksu, Heather Langdond -
Developing once, deploying everywhere: A case study using JIL
Abstract With the increasing number of mobile platforms available, developers aiming to bring their products to the larger number possible of consumers are required to program for different platforms, using different development environments, and...
2011 / Carlos Duarte, Ana Paula Afonso -
Volterra kernels measurement and the application in post calibration of ADCs
Abstract As the proper choice for the digital post-calibration of the Analog to Digital Converters (ADCs), Volterra series has developed on a firm mathematical and logical foundation for decades. The most important issue in the Volterra series...
2012 / Yang Yang, Chen Yueyang, Zhong Shun’an, Ma Minshu -
Web Services Security Problem in Service-oriented Architecture
Abstract With the development and universal application of SOA technology, security issues of Web services based on heterogeneous platform have become increasingly prominent. This article first introduces two security different solutions of...
2012 / Hua Yue, Xu Tao -
Comparing computer anxiety of humanistic, basic science, and technical and engineering students in the University of Tehran regarding gender
Abstract In the last decade, there has been emphasis on computer technology usage in everyday life, and even more, in universities. Multimedia classes with computer related technologies have vastly become norm in university space. Students are...
2011 / Saeed Mazloumiyan, AhmadReza Akbari, Ahmad Rastegar, Reza Ghorban Jahromi -
The Application of Multi-threaded Socket and Picture Field Technology of DataGridView in the Development of Alarm Receiver Software
Abstract In this paper, we achieve the alarm receiving software and discuss programming ideas of the multi-threaded asynchronous receiver about SOCKET and picture field technology of DataGridView in the process of development. ...
2012 / Guo hao -
The Research and Implementation of Three Stages Traffic Stations Intelligent Monitor Systems Based on GIS
Abstract This system used three stage intelligent traffic station subsystems to forecast the path on which vehicle will go. First stage subsystem can forecast road node which adjacented to traffic station. Second stage subsystem was designed for...
2012 / Chen Hong-ying, Xiao Ting, Wangtao, He Jin-yi -
Merging Scenarios
Abstract This paper proposes a merge operator for behavioral requirements expressed by Message Sequence Charts and shows how this product can be systematically used to integrate new behaviors in an existing one. First the merge operator is defined...
2005 / Jacques Klein, Benoit Caillaud, Loïc Hélouët -
Attribute Grammars as Recursion Schemes over Cyclic Representations of Zippers
Abstract Evaluation of attributes w.r.t. an attribute grammar can be obtained by inductively computing a function expressing the dependencies of the synthesized attributes on inherited attributes. This higher-order functional approach to attribute...
2011 / Eric Badouel, Bernard Fotsing, Rodrigue Tchougong -
A Program Logic for Bytecode
Abstract Program logics for bytecode languages such as Java bytecode or the .NET CIL can be used to apply Proof-Carrying Code concepts to bytecode programs and to verify correctness properties of bytecode programs. This paper presents a Hoare-style...
2005 / Fabian Bannwart, Peter Müller -
Compiling Esterel into Static Discrete-Event Code
Abstract Executing concurrent specifications on sequential hardware is important for both simulation of systems that are eventually implemented on concurrent hardware and for those most conveniently described as a set of concurrent processes. As...
2006 / Stephen A. Edwards, Vimal Kapadia, Michael Halas -
Formal Verification of the Quasi-Static Behavior of Mixed-Signal Circuits by Property Checking
Abstract This paper proposes a verification flow for mixed-signal circuits. The presented flow is based on ‘bounded model checking’, a formal verification method. The behavior of the analog parts of a mixed-signal circuit is described with the help...
2006 / Martin Freibothe, Jens Schönherr, Bernd Straube -
Through Modeling to Synthesis of Security Automata
Abstract We define a set of process algebra operators, that we call controller operators, able to mimic the behavior of security automata introduced by Schneider in [Schneider, F. B., Enforceable security policies, ACM Transactions on Information...
2007 / Fabio Martinell, Ilaria Matteucci -
Towards a Systematic Method for Proving Termination of Graph Transformation Systems
Abstract We describe a method for proving the termination of graph transformation systems. The method is based on the fact that infinite reductions must include infinite ‘creation chains’, that is chains of edges in different graphs of the reduction ...
2008 / H.J. Sander Bruggink -
A Random Bag Preserving Product Operation
Abstract The author's current research programme is the development of a modular calculus for the average-cost of data structuring. This modular calculus provides a novel foundation for the analysis of algorithms. Its applicability to the analysis...
2009 / Michel Schellekens -
On Mobility and Communication
Abstract By imposing three semantic constraints on the π-calculus equipped with delayed input, we obtain a variant of the π-calculus. We prove that Hennessy and Riely's distributed π-calculus can be encoded into this new model, satisfying a full...
2009 / Wenjie Du, Yuxin Deng