Computer and information sciences topic list of research papers
-
Efficient parallel and out of core algorithms for constructing large bi-directed de Bruijn graphs2010 / Vamsi K Kundeti, Sanguthevar Rajasekaran, Hieu Dinh, Matthew Vaughn, Vishal Thapar
-
Preface2007 / Vincent Danos, Cosimo Laneve
-
Sequentiality and the CPS Semantics of Fresh Names
Abstract We investigate the domain-theoretic denotational semantics of a CPS calculus with fresh name declaration. This is the target of a fully abstract CPS translation from the nu-calculus with first-class continuations. We describe a notion of...
2007 / J. Laird -
Animation Metaphors for Object-Oriented Concepts
Abstract Program visualization and animation has traditionally been done at the level of the programming language and its implementation in a computer. However, novices do not know these concepts and visualizations that build upon programming...
2007 / Jorma Sajaniemi, Pauli Byckling, Petri Gerdt -
Computing Dialogues with Membranes
Abstract Human-computer interfaces require models of dialogue structure that capture the variability and unpredictability within dialogue. In this paper we propose to use a computing paradigm –P systems– in order to define such a dialogue model. We...
2006 / Gemma Bel-Enguix, M. Dolores Jiménez-López -
Constraint-Based Concurrency and Beyond
Abstract Constraint-based concurrency is a simple and elegant formalism of concurrency with monotonic mobile channels, whose history started in early 1980's as a subfield of logic programming. Although it has hardly been recognized as process...
2006 / Kazunori Ueda -
A Calculus for Generation, Verification and Refinement of BPEL Specifications
Abstract Business Process Execution Language for Web Services (WS-BPEL) is the emerging standard for designing Web Services compositions. In this context, formal methods can contribute to increased reliability and consistency in the BPEL design...
2008 / Faisal Abouzaid, John Mullins -
Synchronization as a Special Case of Access Control
Abstract Synchronization ensures exclusive shared-variable access at runtime, and static access control mechanisms give similar guarantees at compilation time. Usually we treat these language concepts as separate. In this work we propose to...
2009 / Franz Puntigam -
Preface2007 / Jens Knoop, George C. Necula, Wolf Zimmermann
-
An anti-folk theorem for finite past equilibria in repeated games with private monitoring2012 / Marcin Pęski
-
Towards a Model-Driven IEC 61131-Based Development Process in Industrial Automation2011 / Kleanthis Thramboulidis, Georg Frey
-
An ontology-based nurse call management system (oNCS) with probabilistic priority assessment2011 / Femke Ongenae, Dries Myny, Tom Dhaene, Tom Defloor, Dirk Van Goubergen, et al.
-
Design and Development of an Interactive Augmented Reality Edutainment Storybook for Preschool
Abstract This paper presents the development of an engaging method for learning numbers via a highly interactive edutainment children storybook based on augmented reality technology and an old folklore story. Augmented Reality (AR) refers to the...
2012 / Dayang Rohaya, Awang Rambli, Wannisa Matcha, Suziah Sulaiman, Mohd Yunus Nayan -
Using Dynamic Software in Teaching of the Symmetry in Analytic Geometry: The Case of GeoGebra
Abstract With the advent of technology in our time, many researches have been conducted and much software has been developed regarding the usability of computers in mathematics teaching. By using GeoGebra which is dynamic mathematics software, this...
2011 / Adnan Akkaya, Enver Tatar, Türkan Berrin Kağızmanlı -
EFL speaking communication with asynchronous voice tools for adult students
Abstract Through employment of asynchronous voice tools, EFL speaking practice can be moved into the XXIst century with potential benefits for students. The current paper will show that opening the classroom walls to a world audience through...
2011 / Anisoara Pop, Elena Adriana Tomuletiu, Doina David -
A Kind of Message-recoverable Fairness Blind Digital Signature Scheme
Abstract Blind digital signature indeed protects interests of the participants to some extent, but the anonymity of blind digital signature present exploit opportunities to attackers. Aiming at problems of current fairness blind digital signature...
2011 / Jian-shi Zhang -
Privacy-secure image sharing system for a purchaser and recorded subjects using semi-blind fingerprinting
Abstract A privacy-secure image sharing scheme of ubiquitous cameras on the Sensing Web is presented in this paper. It is aiming at distributing images taken by surveillance cameras to ordinary people, where ubiquitous sensors are opened to public...
2010 / Mitsuo Okada, Yasuo Okabe, Tetsutaro Uehara -
A novel automated spike sorting algorithm with adaptable feature extraction
Abstract To study the electrophysiological properties of neuronal networks, in vitro studies based on microelectrode arrays have become a viable tool for analysis. Although in constant progress, a challenging task still remains in this area: the...
2012 / Robert Bestel, Andreas W. Daus, Christiane Thielemann -
Mobile Learning Readiness Among UKM Lecturers
Abstract Mobile technology is providing a new frontier for the application of educational technology within the academia. However, as with any relatively new technology, much has to be understood about the concept of mobile learning before it can be ...
2012 / Afendi Hamat, Mohamed Amin Embi, Haslinda Abu Hassan -
Model of QoS Management in a Distributed Data Sharing and Archiving System
Abstract The scientific applications of the fourth paradigm of science deal with large amounts of data stored in various storage devices or systems. Distributed storage systems are often chosen for storing these data. Some of the requirements posed...
2013 / Darin Nikolow, Renata Słota, Stanisław Polak, Danilo Mitera, Marek Pogoda, et al.