Computer and information sciences topic list of research papers
-
Adaptive Software Architecture Based on Confident HCI for the Deployment of Sensitive Services in Smart Homes2015 / Mario Vega-Barbas, Iván Pau, María Martín-Ruiz, Fernando Seoane
-
Analysis of Lightpath Re-provisioning in Green Optical Networks
Abstract The paper investigates how the level of re-provisioning of lightpaths can affect the calculation of the cost of lightpaths and consequently the result of routing decisions. The paper introduces a re-provisioning mechanism with partial...
2013 / Alireza Nafarieh, Yashar Fazili, William Robertson -
Using Genetic Algorithm to Minimize False Alarms in Insider Threats Detection of Information Misuse in Windows Environment2014 / Maaz Bin Ahmad, Adeel Akram, M. Asif, Saeed Ur-Rehman
-
On Formal and Automatic Security Verification of WSN Transport Protocols2014 / Vinh Thong Ta, Levente Buttyán, Amit Dvir
-
Automated Degradation Diagnosis in Character Recognition System Subject to Camera Vibration2014 / Chunmei Liu
-
Innovative Training Solutions for Quality Managers
Abstract This paper presents the design of a pedagogical methodology for training of quality managers by employment of Activity Based Training (ABT) and Student Response System (SRS). The recent developments and results obtained during pilot testing ...
2015 / Liviu Moldovan -
A hybrid algorithm optimization approach for machine loading problem in flexible manufacturing system2012 / Vijay M Kumar, ANN Murthy, K Chandrashekara
-
An innovative approach for testing bioinformatics programs using metamorphic testing2009 / Tsong Chen, Joshua WK Ho, Huai Liu, Xiaoyuan Xie
-
Mismatched Crowdsourcing based Language Perception for Under-resourced Languages
Abstract Mismatched crowdsourcing is a technique for acquiring automatic speech recognizer training data in under-resourced languages by decoding the transcriptions of workers who don’t know the target language using a noisy-channel model of...
2016 / Wenda Chen, Mark Hasegawa-Johnson, Nancy F. Chen -
FaceBots: Steps Towards Enhanced Long-Term Human-Robot Interaction by Utilizing and Publishing Online Social Information2011 / Nikolaos Mavridis, Michael Petychakis, Alexandros Tsamakos, Panos Toulis, Shervin Emami, et al.
-
Dead code elimination based pointer analysis for multithreaded programs
Abstract This paper presents a new approach for optimizing multitheaded programs with pointer constructs. The approach has applications in the area of certified code (proof-carrying code) where a justification or a proof for the correctness of each...
2012 / Mohamed A. El-Zawawy -
Task and Time Aware Community Detection in Dynamically Evolving Social Networks
Abstract The temporal analysis of the community structure in dynamically evolving networks requires that the nodes and connections between them be sampled into a time series of successive networks by shifting capturing intervals of typically equal...
2013 / Tobias Hecking, Tilman Göhnert, Sam Zeini, Ulrich Hoppe -
Fresh ideas in learner-centered instruction
Abstract Learners should not be passive recipients of knowledge, rather they should use their abilities to participate in their own learning. Is it easy for the learner to be independent? How can teachers foster learners’ autonomy? In our workshop,...
2010 / Ola Sabbagh, Ghonah Hamwyah -
Formalization and validation of the General Inter-ORB Protocol (GIOP) using PROMELA and SPIN2002 / Moataz Kamel, Stefan Leue
-
μCloud: Towards a New Paradigm of Rich Mobile Applications
Abstract Rich mobile applications are characterized by rich functionality, offline usability and portability. However, it isnot trivial to simultaneously satisfy all the three criteria. Existing approaches such stand-alone applications and the...
2011 / Verdi March, Yan Gu, Erwin Leonardi, George Goh, Markus Kirchberg, et al. -
Heterogeneous Clustering Of Sensor Network
Abstract In this paper, we proposed a heterogeneous clustering of sensor network in which different types of sensors exist that report to different sinks. This heterogeneous clustering approach has its own security measures in which only registered...
2011 / Mazen G. Khair, Burak Kantarci, Hussein T. Mouftah -
A framework for peer-to-peer video streaming over WiMax
Abstract Real-time peer-to-peer (P2P) streaming video traffic will constitute a significant proportion of future Internet traffic. With the availability of WiMAX, a large number of these peers will be ubiquitous and located on WiMAX based mobile...
2011 / Kashinath Basu, Muhammad Younas -
Preface2011 / Jiang Li
-
Detecting insecure person in crowd with human sensor
Abstract We consider the problem of detecting potential dangerous people (i.e. terrorist) in a crowded but closed environment such as airport (and railway station). Instead of conventional sensor, we proposed to use human (passengers) themselves as...
2011 / Chao Wu, Yike Guo -
Considerations Related to the Added Values Achieved in the VccSSe Comenius 2.1 European Project
Abstract The paper emphasizes on several added values registered during the life of the three years European Socrates-Comenius 2.1 project “VccSSe - Virtual Community Collaborating Space for Science Education” related to the gains attained by the...
2011 / Gabriel Gorghiu, Adina Elena Glava, Laura Monica Gorghiu, Cătălin Cosmin Glava