Computer and information sciences topic list of research papers
-
From UML Models to Graph Transformation Systems
Abstract In this paper we present an approach that allows to validate properties of UML models. The approach is based on an integrated semantics for central parts of the UML. We formally cover UML use case, class, object, statechart, collaboration,...
2005 / Paul Ziemann, Karsten Hölscher, Martin Gogolla -
Formalizing Operational Semantic Specifications in Logic
Abstract We review links between three logic formalisms and three approaches to specifying operational semantics. In particular, we show that specifications written with (small-step and big-step) SOS, abstract machines, and multiset rewriting, are...
2009 / Dale Miller -
Strategy-Based Proof Calculus for Membrane Systems
Abstract In a previous work, we showed how rewrite strategies can be used for defining the semantics of membrane systems, in particular for expressing the different control mechanisms in membranes. The insufficient expressivity of the existing...
2009 / Oana Andrei, Dorel Lucanu -
JHAVÉ – More Visualizers (and Visualizations) Needed
Abstract We recap the results of an ITiCSE 2002 Working Group report [Naps, T. L., G. Rößling, V. Almstrum, W. Dann, R. Fleischer, C. Hundhausen, A. Korhonen, L. Malmi, M. McNally, S. Rodger and J. A. Velázquez-Iturbide, Exploring the role of...
2007 / Thomas L. Naps, Guido Rößling -
Process Algebra Under the Light of Wolfram's NKS
Abstract The strong intellectual investment behind the definition of process algebras and the high abstraction level they can attain in formal specification still contrasts with their degree of penetration into software engineering practice, but...
2006 / Tommaso Bolognesi -
Sub-λ-calculi, Classified
Abstract When sharing is studied in the λ-calculus, some sub-calculi often pop up, for instance λI or the linear λ-calculus. In this paper, we generalise these to a large class of sub-calculi, parametrised by an arbitrary predicate on the number of...
2008 / François-Régis Sinot -
Efficient generated libraries for asynchronous derivative computation
Abstract The computation of derivatives via automatic differentiation is a valuable technique in many science and engineering applications. While the implementation of automatic differentiation via source transformation yields the highest-efficiency ...
2010 / Darius Buntinas, Alexis J. Malozemoff, Jean Utke -
Semantic Annotations for Customizing Geographical Maps Based on WordNet
Abstract Geographical maps are an ideal technique to present and visualizethe real world information which is retrieved from various resources such as satellite and sensors. These data are effectively used in complex applications like Google and...
2012 / Anthoniraj Amalanathan, S. Shanmugam, M. Senthilnathan, S. Harikumar -
Performance Evaluation of MIMO-OFDM Modeling for UMTS-Long Term Evolution Downlink System
Abstract As the demand for the Mobile Communication Services increase, the research towards high data rate for meeting higher demands also increases. This made the path for the evolution towards the fourth generation Mobile Communication named as...
2012 / N.R. Raajan, A. Jenifer Philomina, S. Suganya, B. Monisha, M.V. Priya, et al. -
Duplication with Trapdoor Sensitive Attribute Values: A New Approach for Privacy Preserving Data Publishing
Abstract Privacy Preserving Data Publishing addresses the problem of publishing the data collected from data owners by the data holder or publisher such that personal sensitive information of the individual is preserved and the published data is...
2012 / B.R. Purushothama, B.B. Amberker -
Indoor UAV Positioning Using Stereo Vision Sensor
Abstract The UAV system has becoming increasingly popular in the application such as surveillance, reconnaissance, mapping and many more. Different from guided vehicles, which rely on the pilot to navigate the system, UAV relies on autonomous...
2012 / Yasir Mohd Mustafah, Amelia Wong Azman, Fajril Akbar -
Formal Verification of IEEE 802.11w Authentication Protocol
Abstract IEEE 802.11 is the standard designed to provide secured communication in wireless LAN. IEEE 802.11w authentication protocol enhances the IEEE802.11i security for selected management frames. These protocols allow a wireless station to gain...
2012 / V. Valli Kumari, K.V. Krishnam Raju -
Unifying Views of UML2004 / Zhiming Liu, Jifeng He, Jing Liu, Xiaoshan Li
-
Bounded Model Checking with SNF, Alternating Automata, and Büchi Automata
Abstract Model checking of LTL formulæis traditionally carried out by a conversion to Büchi automata, and there is therefore a large body of research in this area including some recent studies on the use of alternating automata as an intermediate...
2005 / Daniel Sheridan -
A Graphical Fusion Calculus2004 / Ivan Lanese, Ugo Montanari
-
Preface2004 / Antonio Brogi, Jean-Marie Jacquet, Ernesto Pimentel
-
Architectural Prototyping: From CCS to .Net
Abstract Over the last decade, software architecture emerged as a critical issue in Software Engineering. This encompassed a shift from traditional programming towards software development based on the deployment and assembly of independent...
2005 / Nuno F. Rodrigues, Luís S. Barbosa -
EMYS—Emotive Head of a Social Robot2013 / Jan Kędzierski, Robert Muszyński, Carsten Zoll, Adam Oleksy, Mirela Frontkiewicz
-
Analysis of a Buyer–Seller Watermarking Protocol for Trustworthy Purchasing of Digital Contents2009 / Raphael C.-W. Phan, Bok-Min Goi, Geong-Sen Poh, Jongsung Kim
-
C2BF: Cache-based Counting Bloom Filter for Precise Matching in Network Packet Processing
Abstract Bloom filter is widely used in network packet processing due to its fast lookup speed and small memory cost. However, the non-negligible false positive rate and the difficulty of online update still prevent it from extensive utilization. In ...
2012 / Yachao Zhou, Tian Song, Wenliang Fu, Xiaojun Wang