Computer and information sciences topic list of research papers
-
Adaptation for Hierarchical Components and Services
Abstract Software coordination and adaptation are tightly related to modular software entities and access points. These entities (components or services) may be complex, dissimilar (various models) and designed at different granularity levels. In...
2007 / Pascal André, Gilles Ardourel, Christian Attiogbé -
Team Automata for Security
Abstract In [Kleijn, J., Team Automata for CSCW – A Survey –, Petri Net Technology for Communication-Based Systems—Advances in Petri Nets, LNCS 2472, Springer, 2003, 295–320], Kleijn presented a survey of the use of team automata for the...
2005 / Maurice H. ter Beek, Gabriele Lenzini, Marinella Petrocchi -
Categorical Models for Simply Typed Resource Calculi
Abstract We introduce the notion of differential λ-category as an extension of Blute-Cockett-Seely's differential Cartesian categories. We prove that differential λ-categories can be used to model the simply typed versions of: (i) the differential...
2010 / Antonio Bucciarelli, Thomas Ehrhard, Giulio Manzonetto -
A Concern-based Technique for Architecture Modelling Using the UML Package Merge
Abstract In this paper, we present a concern-based technique for software architecture modelling. We use the new UML 2 Package Merge relationship as a technique for the separation of concerns. We present the advantages of using the UML Package Merge ...
2006 / Samir Ammour, Philippe Desfray -
How to Brew-up a Refinement Ordering
Abstract Fifty years ago there were few mathematical models of program semantics, perhaps none. Now there is probably a new one created every day. How do we do it? How should we do it? In our community we understand the utility of...
2009 / Carroll Morgan -
Executable Contracts for Incremental Prototypes of Embedded Systems
Abstract In this paper, we advocate for a seamless design-flow for embedded reactive programs. We particularly concentrate on the use of assume-guarantee contracts (as a form of non-deterministic specification) and present how these can be used for...
2009 / Lionel Morel, Louis Mandel -
Term Graphs for Computing Derivatives in Imperative Languages
Abstract Automatic differentiation is a technique for the rule-based transformation of a subprogram that computes some mathematical function into a subprogram that computes the derivatives of that function. Automatic differentiation algorithms are...
2007 / Paul D. Hovland, Boyana Norris, Michelle Mills Strout, Jean Utke -
Algorithmic Algebraic Model Checking III: Approximate Methods
Abstract We present computationally efficient techniques for approximate model-checking using bisimulation-partitioning, polyhedra, grids and time discretization for semi-algebraic hybrid systems, and demonstrate how they relate to and extend other...
2009 / Venkatesh Mysore, Bud Mishra -
Comparing text classifiers for sports news
Abstract The rise of Machine Learning (ML) techniques has given life to text classification discipline and its many applications we enjoy these days such as spam filters and opinion mining which became an essential part of our daily life. Tools and...
2012 / Tarik S. Zakzouk, Hassan I. Mathkour -
Monotone digital signatures: an application in software copy protection
Abstract In settings where hard-copy materials which are not allowed to be reproduced by any means but are massively delivered to users security specialists distinguish a real threat which is duplication. Such materials may be banknotes, legal...
2012 / Edlira Martiri, Artur Baxhaku -
Statistical Characterization of the Botnets C&C Traffic
Abstract Botnets are used for various purposes, most of them related to illegitimate activity, being also the sources of massive exploit activity as they recruit new vulnerable systems to expand their reach. Due to their volume, diverse capabilities ...
2012 / Pedro Correia, Eduardo Rocha, António Nogueira, Paulo Salvador -
Dyslexia: An Educational Project in the Sound and Music Scope
Abstract The project is split in eleven different units, one after the other following different difficulties levels. They can be used both for education and support, if several cases of dyslexia are present in a class. In this aforementioned...
2015 / Anna Maria Ferrone, Stefano Olivi -
Pose Invariant Hand Biometry Using Multiple Database
Abstract We propose the significance in use of multiple databases for the purpose of authentication using the palm-print of the hand for increased speed. The technique is used for authentication using the acquired image of the hand. The hand could...
2012 / Neena Susan Alex, E.S. Karthik Kumar, Jose J. Tharayil -
Categorization Of Watermelon Maturity Level Based On Rind Features
Abstract This paper proposed a method to determine the best capture position of the watermelon's rind for categorization of maturity level. A total of forty five watermelon samples are used specifically fifteen samples are in 60% ripeness, another...
2012 / N. Ahmad Syazwan, M.S.B. Shah Rizam, M.T. Nooritawati -
Power Control Optimization for Lte-Advanced Relay Networks
Abstract Relay nodes (RNs) promise to increase the network capacity and to better distribute resources in the cell, or alternatively, extend the cell coverage area. RN-served user equipments (relay-UEs) can create severe inter-cell interference in...
2012 / D. Gururaj, P. Pandiaraj -
Performance Amelioration of Edge Detection Algorithms Using Concurrent Programming
Abstract Edge detection is a terminology that aims at identifying points in a digital image at which the image brightness changes sharply or more formally has discontinuities. The purpose of detecting sharp changes in image brightness is to capture...
2012 / K. Swargha, Paul Rodrigues -
3-D Medical Image Compression for Telemedicine Application
Abstract In telemedicine application, it is essential to reduce both storage and transmission bandwidth requirements needed for archival and communication. In order to achieve this 3D scalable compression method for medical images with optimal...
2012 / Sujitha Juliet Devaraj, Kirubakaran Ezra, A. Allvin -
Genetic Algorithm with Search Bank Strategies for University Course Timetabling Problem
Abstract University Course Timetabling Problem (UCTP) is a multi-assignment problem in which Students, Staff, and Subjects together as events are scheduled to suitable timeslots and assigned to available classrooms. The design of scheduling of...
2012 / A. Araisa Mahiba, C. Anand Deva Durai -
A Novel Technique for Name Identification from Homeopathy Diagnosis Discussion Forum
Abstract Named entities are the most informative element of a textual document and identification of the names is very much important for extracting further information from text. We have developed a conditional random field based system to identify ...
2012 / Mukta Majumder, Utsav Barman, Rahul Prasad, Kumar Saurabh, Sujan Kumar Saha -
Virtual Board: A low cost Multi Touch Human Computer Interaction System
Abstract Nowadays, there are new techniques to interact remotely with a computer which by hand offer an easy management for the users and by another hand are more interactive with them. But some devices are expensive, difficult to carry out. And...
2012 / Wan-Chen Lee, Dora Adriana Merino-Schettino, Ignacio López-Martínez, Ruben Posada-Gómez, Ulises Juárez-Martínez