Computer and information sciences topic list of research papers
-
A two-stage approach for managing actuators redundancy and its application to fault tolerant flight control
Abstract In safety-critical systems such as transportation aircraft, redundancy of actuators is introduced to improve fault tolerance. How to make the best use of remaining actuators to allow the system to continue achieving a desired operation in...
2015 / Lunlong Zhong, Mora-Camino Félix -
Image Matching Using Generalized Scale-Space Interest Points2014 / Tony Lindeberg
-
Gamification Patterns for Gamification Applications
Abstract Recently, gamification has gained popularity in the development of enterprise information systems. Gamification is usually implemented using game elements combined with game mechanics that encourage competition between game players trying...
2014 / Darius Ašeriškis, Robertas Damaševičius -
A Method for Analyzing Service Failure Factors based on Multiple Perspectives
Abstract In order to continually make a profit, It is important for companies to prevent service failure. For preventing service failure, at first, service designers need to extract their factors that cause service failures and to understand their...
2014 / Junpei Saito, Yusuke Kurita, Koji Kimita, Yoshiki Shimomura -
Design of applied and decorative art elements based on the example of Nanai shaman's culture
Abstract This article describes the history of the culture of Nanai shamanism. The object of my work is the development of applied and decorative art handiworks through the culture of Far-Eastern indigenous people, for example...
2014 / Maria Gaidysheva, Alexey V. Parnyakov -
A Novel Distributed Clustering Protocol Using Fuzzy Logic
Abstract Energy resource constraint is an important issue in wireless sensor networks. An efficient solution to this issue is clustering approach; which markes the network nodes as cluster heads (CHs) and cluster members (CMs). In the clustering...
2014 / Maryam Mirsadeghi, Ali Mahani, Maryam Shojaee -
Analysis of the Impact of Social Feedback on Written Production and Student Engagement in Language Moocs
Abstract This paper explores the challenges of receiving feedback in a language MOOC and proposes a model for social feedback that aims to develop students’ foreign language written skills. The experience of the first edition of the first language...
2014 / Patricia Ventura, Elena Bárcena, Elena Martín-Monje -
Sophisticated security verification on routing repaired balanced cell-based dual-rail logic against side channel analysis2014 / Wei He, Jean-Luc Danger, Eduardo de la Torre, Tarik Graba, Andres Otero, et al.
-
Smart Phone Based Data Mining for Human Activity Recognition
Abstract Automatic activity recognition systems aim to capture the state of the user and its environment by exploiting heterogeneous sensors, and permit continuous monitoring of numerous physiological signals, where these sensors are attached to the ...
2015 / Girija Chetty, Matthew White, Farnaz Akther -
A Secure and Light Weight Authentication Service in Hadoop using One Time Pad
Abstract To store and process sensitive data related to credit card, healthcare, financial, government which constitutes the big data, Hadoop environment is supplemented with HDFS i.e Hadoop Distributed File System, which is a cloud based, parallel...
2015 / Mrudula Sarvabhatla, M. Chandra Mouli Reddy, Chandra Sekhar Vorugunti -
A Methodology for Profiling and Partitioning Stream Programs on Many-core Architectures
Abstract Maximizing the data throughput is a very common implementation objective for several streaming applications. Such task is particularly challenging for implementations based on many-core and multi-core target platforms because, in general,...
2015 / Ma-lgorzata Michalska, Jani Boutellier, Marco Mattavelli -
Use of a Recursive-Rule eXtraction algorithm with J48graft to achieve highly accurate and concise rule extraction from a large breast cancer dataset
Abstract To assist physicians in the diagnosis of breast cancer and thereby improve survival, a highly accurate computer-aided diagnostic system is necessary. Although various machine learning and data mining approaches have been devised to increase ...
2016 / Yoichi Hayashi, Satoshi Nakano -
Efficient Architecture for Spike Sorting in Reconfigurable Hardware2013 / Wen-Jyi Hwang, Wei-Hao Lee, Shiow-Jyu Lin, Sheng-Ying Lai
-
Measuring Semantic and Structural Information for Data Oriented Workflow Retrieval with Cost Constraints2014 / Yinglong Ma, Liying Zhang, Moyi Shi
-
PLI Cancellation in ECG Signal Based on Adaptive Filter by Using Wiener-Hopf Equation for Providing Initial Condition2014 / Anchalee Manosueb, Jeerasuda Koseeyaporn, Paramote Wardkein
-
Online EM with Weight-Based Forgetting2015 / Enric Celaya, Alejandro Agostini
-
Multiple-access relaying with network coding: iterative network/channel decoding with imperfect CSI2013 / Xuan-Thang Vu, Marco Renzo, Pierre Duhamel
-
Preface
Abstract This issue contains the Proceedings of the Second Workshop on Intersection Types and Related Systems (ITRS'02). The Workshop was held in Copenhagen, Denmark on July 26, 2002, as satellite event to FLoC '02. Intersection...
2005 / Steffen van Bakel -
Preface
Abstract This volume contains the Proceedings of the First Workshop on Security of Mobile Multiagent Systems (SEMAS'2001). The Workshop was held in Montreal, Canada on May 29, 2001, as satellite event to the 5th International Conference on...
2005 / Klaus Fischer, Dieter Hutter -
Monadic Second Order Logic And Its Fragments
Abstract Various recent results about monadic second order logic and its fragments are presented. These results have been obtained in the framework of the EU TMR Project GETGRATS.
2004 / Giacomo Lenzi