Computer and information sciences topic list of research papers
-
Juggrnaut: Graph Grammar Abstraction for Unbounded Heap Structures
Abstract We present a novel abstraction framework for heap data structures that uses graph grammars, more precisely context-free hyperedge replacement grammars, as an intuitive formalism for efficiently modeling dynamic data structures. It aims at...
2011 / Jonathan Heinen, Thomas Noll, Stefan Rieger -
Model Checking Downward Simulations
Abstract This paper shows how downward simulation can be checked using existing temporal logic model checkers. In particular, we show how the branching time temporal logic CTL can be used to encode the standard downward simulation conditions. We do...
2005 / Graeme Smith, John Derrick -
About Constructive vectors
Abstract We explore several ways of constructively implementing vectors in proof assistants and we discuss their advantages and their drawbacks.
2005 / Jean Duprat -
A Program Result Checker for the Lexical Analysis of the GNU C Compiler
Abstract In theory, program result checking has been established as a well-suited method to construct formally correct compiler frontends but it has never proved its practicality for real-life compilers. Such a proof is necessary to establish result ...
2005 / Sabine Glesner, Simone Forster, Matthias Jäger -
Lightweight Static Capabilities
Abstract We describe a modular programming style that harnesses modern type systems to verify safety conditions in practical systems. This style has three ingredients: (i) ...
2007 / Oleg Kiselyov, Chung-chieh Shan -
When Model-based Testing Fails
Abstract Armando Haeberer made a substantial contribution in translating results from the philosophy of science to software testing. He showed that the limits of the standard methodology of confirming theories, where observations are derived from...
2006 / Bernhard K. Aichernig, Chris George -
Multiple Synchrony in MSC
Abstract We propose an extension to Message Sequence Charts (MSC); MSC diagrams comprise processes (called instances) and messages. Messages in MSC are either asynchronous or method calls. Our extension adds multiple synchronous messages. We present ...
2009 / Flávia Falcão, Juliano Iyoda, Augusto Sampaio -
Task planning for cooperating self-reconfigurable mobile fixtures2013 / Włodzimierz Kasprzak, Dimiter Zlatanov, Wojciech Szynkiewicz, Teresa Zielińska
-
A Novel Mobile Payment Scheme based on Secure Quick Response Payment with Minimal Infrastructure for Cooperative Enterprise in Developing Countries
Abstract Cooperative play essential role in national development because it can improve the prosperity of society. This paper proposes a novel mobile payment scheme for cooperative. Our scheme modifies the existing QR-Pay system by eliminate the...
2013 / Hatma Suryotrisongko, Sugiharsono, Bambang Setiawan -
Number of packets in transit as a function of source load and routing
Abstract We study how network performance in delivering packets to their destinations is affected by routing algorithm coupled with volume of incoming traffic. We focus our study on the number of packets in transit (NPT) that is an aggregate measure ...
2010 / Anna T. Lawniczak, Shengkun Xie -
Exploring ontology metrics in the biomedical domain
Abstract Ontologies are gaining popularity in many domains as a way of representing, dealing and reasoning with large volumes of information, and they are starting to play a major role in computational science applications, e.g. in biomedical...
2010 / N. Manouselis, M.A. Sicilia, D. Rodríguez -
Implementation of a linear programming solver on the Cell BE processor
Abstract We describe an implementation of a parallel linear programming solver on the Cell BE processor. This implementation is based on GLPK C routines which solve LP problems using a serial implementation of one of the interior point methods. We...
2010 / Mujahed Eleyat, Lasse Natvig -
Energy efficient CBMT for secure multicast key distribution in mobile ad hoc networks
Abstract Multicast key distribution in mobile adhoc networks is challenging due to its inherent characteristics of infrastructure-less architecture with lack of central authority and limited resources such as bandwidth, time and power. In many...
2010 / D. Suganyadevi, G. Padmavathi -
Recommending knowledgeable people in a work-integrated learning system
Abstract According to studies into learning at work, interpersonal help seeking is the most important strategy of how people acquire knowledge at their workplaces. Finding knowledgeable persons, however, can often be difficult for several reasons....
2010 / Günter Beham, Barbara Kump, Tobias Ley, Stefanie Lindstaedt -
Biometric Template Security2008 / Anil K Jain, Karthik Nandakumar, Abhishek Nagar
-
Contention-based node selection with applications to relay communications and load balancing2013 / Günther Brandner, Christian Bettstetter, Udo Schilcher
-
Toward a unified framework of motion understanding2012 / J.K. Aggarwal, M.S. Ryoo
-
Model-based Runtime Verification Framework for Self-optimizing Systems
Abstract This paper describes a novel on-line model checking approach offered as service of a real-time operating system (RTOS). The verification system is intended especially for self-optimizing component-based real-time systems where...
2006 / Y. Zhao, S. Oberthür, M. Kardos, F.J. Rammig -
TOY: A System for Experimenting with Cooperation of Constraint Domains
Abstract This paper presents, from a user point-of-view, the mechanism of cooperation between constraint domains that is currently part of the system TOY , an implementation of a constraint functional...
2009 / S. Estévez-Martín, A.J. Fernández Leiva, F. Sáenz-Pérez -
Decidability of Reachability for Polymorphic Systems with Arrays: A Complete Classification
Abstract Many interesting systems can be seen as having two kinds of state variables: array variables, which are mappings from one data type into another; and basic variables, which are used to control the system, to perform basic computations, and...
2005 / Ranko Lazić