Computer and information sciences topic list of research papers
-
One-to-one with shared-display groupware for supporting face-to-face web co-discovery
Abstract Web co-discovery, which means a certain group members collaboratively discover web resources for learning, has become imperative in authentic, open-ended learning environment. Group members may select, organize and further construct their...
2010 / Chia-Jung Chang, Chen-Chung Liu, Gwo-Dong Chen, Chin-Yuan Liu -
Role of institutions of higher learning towards a knowledge-based community utilising mobile devices
Abstract Mobile/Handheld devices can be used for various subjects in higher education. Mobile learning draws on the theory and practice of pedagogies used in technology enhanced learning and others used in the classroom and the community, and takes...
2010 / Rozhan M. Idrus, Issham Ismail -
A resource block organization strategy for scheduling in carrier aggregated systems2012 / Guillermo Galaviz, David H Covarrubias, Angel G Andrade, Salvador Villarreal
-
Design, development and field evaluation of a Spanish into sign language translation system2011 / R. San-Segundo, J. M. Montero, R. Córdoba, V. Sama, F. Fernández, et al.
-
Open Source and Accessibility: Advantages and Limitations2013 / Michael J. Heron, Vicki L. Hanson, Ian Ricketts
-
Towards a dynamic balance between humans and automation: authority, ability, responsibility and control in shared and cooperative control situations2011 / Frank Flemisch, Matthias Heesen, Tobias Hesse, Johann Kelsch, Anna Schieben, et al.
-
A Fuzzy Reputation System in Vehicular Ad hoc Networks
Abstract Vehicular Ad hoc Networks (VANET) rely on the cooperation of the nodes to forward packets for each other. Some nodes may decide not to cooperate to save their resource while still using network resources. These nodes are called selfish. It...
2011 / Mohammad Jalali, Nasser Ghasem Aghaee -
An Improved Symbol Mapping on 8-ary Constellation for BICM-ID1
Abstract Bit-interleaved coded modulation (BICM) is a bandwidth-efficient coding technique, which can improve the bit error rate (BER) performance over the Rayleigh channel due to the increase of diversity order. However, it reduces the free squared ...
2012 / Liu Na, Che Qing, Li Jianping -
Ad Hoc Access Gateway Selection Algorithm
Abstract With the continuous development of mobile communication technology, Ad Hoc access network has become a hot research, Ad Hoc access network nodes can be used to expand capacity of multi-hop communication range of mobile communication system, ...
2012 / Liu Jie -
Enhancing role-based trust management with a reputation system for MANETs2011 / Rehan Akbani, Turgay Korkmaz
-
Constructing and Reasoning About Security Protocols Using Invariants
Abstract In this work we explore the applicability of the programming method of Feijen and van Gasteren to the construction of security protocols. This method addresses the derivation of concurrent programs from a formal specification, and it is...
2008 / Arjan J. Mooij -
Behavioural Types for Service Integration: Achievements and Challenges
Abstract Increasing attention is being paid to the development of so-called behavioural types as a means to formally address the problem of ensuring the correct interoperation of software components as well as of Web services. The objective of this...
2007 / Antonio Brogi, Carlos Canal, Ernesto Pimentel -
Splitting Mobility and Communication in Boxed Ambients
Abstract Stemming from our previous work on BACI, a boxed ambient calculus with communication in- terfaces, we define a new calculus that further enhances communication mechanisms and mobility control by introducing multiple communication ports,...
2006 / Pablo Garralda, Adriana Compagnoni -
Tool Support for Proof Engineering
Abstract Modern integrated development environments (IDEs) provide programmers with a variety of sophisticated tools for program visualization and manipulation. These tools assist the programmer in understanding legacy code and making coordinated...
2007 / Anne Mulhern, Charles Fischer, Ben Liblit -
Decidability of Innermost Termination and Context-Sensitive Termination for Semi-Constructor Term Rewriting Systems
Abstract Yi and Sakai [Y. Wang and M. Sakai. Decidability of termination for semi-constructor trss, left-linear shallow trss and related systems. In the 17th International Conference on Rewriting Techniques and Applications, volume 4098 of Lecture...
2008 / Keita Uchiyama, Masahiko Sakai, Toshiki Sakabe -
Analysis of Rewrite-Based Access Control Policies
Abstract The rewrite-based approach provides executable specifications for security policies, which can be independently designed, verified, and then anchored on programs using a modular discipline. In this paper, we describe how to perform queries...
2009 / Claude Kirchner, Hélène Kirchner, Anderson Santana de Oliveira -
Toward Automatic Concurrent Debugging Via Minimal Program Mutant Generation with AspectJ
Abstract Debugging is one of the most time-consuming activities in program design. Work on automatic debugging has received a great deal of attention and there are a number of symposiums dedicated to this field. Automatic debugging is usually...
2007 / Shady Copty, Shmuel Ur -
Combining Techniques to Reduce State Space and Prove Strong Properties
Abstract An on-the-fly symmetry reduction technique that exploits the lexicographic order on metarepresentations of Maude terms, and a technique that uses auxiliary data to verify strong properties that are not directly expressible in propositional...
2009 / Dilia E. Rodríguez -
Colouring Proofs: A Lightweight Approach to Adding Formal Structure to Proofs2004 / Laurent Théry
-
A Tableau Method for Checking Rule Admissibility in S4
Abstract Rules that are admissible can be used in any derivations in any axiomatic system of a logic. In this paper we introduce a method for checking the admissibility of rules in the modal logic S4. Our method is based on a standard semantic...
2010 / Sergey Babenyshev, Vladimir Rybakov, Renate A. Schmidt, Dmitry Tishkovsky