Computer and information sciences topic list of research papers
-
Early Verification of Computer Systems Temporal Properties
Abstract In early moments of computer systems development, computer engineers typically draw interaction diagrams, occasionally annotated with timing constraints, to reason about the specification of the system behavior. One of the most popular of...
2005 / Paulo Sérgio Muniz Silva -
Verification of Scenario-based Specifications using Templates
Abstract Specifying dynamic behaviour of a system by listing scenarios of its interactions has become a popular practice. Message sequence chart (MSC) is a rigorous and widely used notation for specifying such scenarios of system behaviour....
2005 / Girish Keshav Palshikar, Purandar Bhaduri -
Geographical Versus Functional Modelling by Statecharts of Interlocking Systems
Abstract The development of computer controlled Railway Interlocking Systems (RIS) has seen an increasing interest in the use of Formal Methods, due to their ability to precisely specify the logical rules that guarantee the safe establishment of...
2005 / Michele Banci, Alessandro Fantechi -
Specifying Properties of Concurrent Computations in CLF
Abstract CLF (the Concurrent Logical Framework) is a language for specifying and reasoning about concurrent systems. Its most significant feature is the first-class representation of concurrent executions as monadic expressions. We illustrate the...
2008 / Kevin Watkins, Iliano Cervesato, Frank Pfenning, David Walker -
Lifting Infinite Normal Form Definitions From Term Rewriting to Term Graph Rewriting
Abstract nfinite normal forms are a way of giving semantics to non-terminating rewrite systems. The notion is a generalization of the Böhm tree in the lambda calculus. It was first introduced in [Ariola, Z. M. and S. Blom, Cyclic lambda calculi, in: ...
2007 / Stefan Blom -
Worst Case Reaction Time Analysis of Concurrent Reactive Programs
Abstract Reactive programs have to react continuously to their inputs. Here the time needed to react with the according output is important. While the synchrony hypothesis takes the view that the program is infinitely fast, real computations take...
2008 / Marian Boldt, Claus Traulsen, Reinhard von Hanxleden -
Declarative Intraprocedural Flow Analysis of Java Source Code
Abstract We have implemented intraprocedural control-flow and data-flow analysis of Java source code in a declarative manner, using reference attribute grammars augmented with circular attributes and collection attributes. Our implementation is...
2009 / Emma Nilsson-Nyman, Görel Hedin, Eva Magnusson, Torbjörn Ekman -
The Affine Hull of a Binary Automaton is Computable in Polynomial Time
Abstract We present the class of binary automaton, a new representation for the subsets of N m that naturally extends the NDD ([Wolper, P. and B. Boigelot, An automata-theoretic...
2004 / Jérôme Leroux -
XML Structural Join Based on Extended Region Coding
Abstract XML has become a standard technology in exchange of a wide variety of data on web and internet for its structure, label, portability and expansibility. To efficiently query XML documents has been the primary urgent task. At the present...
2012 / YANG Yang, LI Hai-ge -
A novel method of aerial image classification based on attention-based local descriptors
Abstract This paper proposes a novel method for object-based classification in very high spatial resolution aerial image. It combines the saliency maps very closely to extract the conspicuous local regions for better description of object and...
2009 / Sheng Xu, Tao Fang, Hong Huo, Deren Li -
Watermarking in Transform Domains (WTD)
Abstract In this paper two separate models of watermarking has been proposed based on wavelet and Z domain along with comparative study in terms of PSNR, MSE and IF. The cover image is passed through transformation based on 2 x 2 mask as sliding...
2012 / J.K. Mandal -
Minutiae Based Thermal Human Face Recognition using Label Connected Component Algorithm
Abstract In this paper, a thermal infra red face recognition system for human identification and verification using blood perfusion data and back propagation feed forward neural network is proposed. The system consists of three steps. At the very...
2012 / Ayan Seal, Suranjan Gangulyb, Debotosh Bhattacharjee, Mita Nasipuri, Dipak Kumar Basu -
A Survey on Various Edge Detector Techniques
Abstract Edge detection is the first step in many computer vision applications. Edge detection significantly reduces the amount of data and filters out unwanted or insignificant information and gives the significant information in an image. These...
2012 / Saket Bhardwaj, Ajay Mittal -
SVM Classifier for Automatic Surveillance System
Abstract In this paper we describe a home security system based on SVM Classifier. Images were taken in uncontrolled indoor environment using video cameras of various qualities. Database contains 4,005 static images (in visible and infrared...
2012 / A.K. Junoh, M.N. Mansor, S.A. Abu, W.Z. Wan Ahmad, A.Z. Mukhtar, et al. -
Preface2005 / Agostino Cortesi, Francesco Logozzo
-
Inferring Context-Free Grammars for Domain-Specific Languages
Abstract In the area of programming languages, context-free grammars (CFGs) are of special importance since almost all programming languages employ CFG's in their design. Recent approaches to CFG induction are not able to infer context-free grammars ...
2005 / Matej Črepinšek, Marjan Mernik, Barrett R. Bryant, Faizan Javed, Alan Sprague -
A Meta-Model for Fact Extraction from Delphi Source Code
Abstract Fact extraction by parsing is often the first step when analyzing a software system in a reverse engineering context. Essential to a fact extractor is the underlying meta-model, which specifies the elements and relations to be extracted. In ...
2004 / Jens Knodel, G. Calderon-Meza -
Mining Community in Mobile Social Network
Abstract With the popularity of mobile devices and wireless technologies, mobile communication network systems are increasingly available. In this paper we propose a new algorithm for mining interesting communities or groups in Mobile Social...
2012 / Ke Xu, Xinfang Zhang -
VLSI ARCHITECTURE FOR DESPECKLING OF SAR IMAGE USING PARAMETRIC MULTIWAVELET
Abstract Removal of speckle noise from SAR (Synthetic Aperture RADAR) image is of greatest interest to many researches for practical as well as theoretical purposes. Many traditional linear and non linear methods are proposed for the despeckling of...
2012 / Vidhyalavanya R, Madheswaran M -
Improving Sharing Efficiency in Online Short Video System through Using P2P Based Mechanism
Abstract Online short video sharing is reshaping the way people watching videos, present sharing policy mainly adopt the client/server architecture, which can result huge bandwidth pressure at streaming server. This paper propose a P2P based short...
2012 / Li Yan, Chen Zhuo, Zhang Hua