Computer and information sciences topic list of research papers
-
Dynamic Translucency with Abstraction Kinds and Higher-Order Coercions
Abstract When a module language is combined with forms of non-parametric type analysis, abstract types require an opaque dynamic representation in order to maintain abstraction safety. As an idealisation of such a module language, we present a...
2008 / Andreas Rossberg -
Mixed Rational Assessments of Possibility and Probability Measures
Abstract In this paper we introduce the modal-fuzzy logic FPΠ(RŁΔ) for reasoning about probability and possibility at the same time. We will use such a logical formalism in order to treat mixed assessments of both those kinds of measures. The main...
2007 / Tommaso Flaminio, Enrico Marchioni -
Analyzing Reachability for Some Petri Nets With Fast Growing Markings
Abstract Using linear algebraic techniques, we analyse the computational complexity of testing reachability in Petri nets for which markings can grow very fast. This leads to two subclasses of Petri nets for which the reachability problem is...
2008 / M. Praveen, Kamal Lodaya -
A Lightweight Approach for the Semantic Validation of Model Refinements
Abstract Model Driven Engineering proposes the use of models at different levels of abstraction. Step by step validation of model refinements is necessary to guarantee the correctness of the final product with respect to its initial models. But,...
2008 / Claudia Pons, Diego Garcia -
From UML models to automatic generated tests for the dotLRN e-learning platform
Abstract This paper presents a method for testing an e-learning, web based system. System specifications are provided using the UML modelling language and specifically the Sequence, Activity and Class diagrams of UML. These specifications are...
2005 / Ana Cavalli, Stéphane Maag, Sofia Papagiannaki, Georgios Verigakis -
Vulnerabilities in Anonymous Credential Systems
Abstract We show the following: (i) In existing anonymous credential revocation systems, the revocation authority can link the transactions of any user in a subset T of...
2008 / R. Bhaskar, K. Chandrasekaran, S.V. Lokam, P.L. Montgomery, R. Venkatesan, et al. -
A Calculus for Data Mapping
Abstract Technologies for overcoming heterogeneities between autonomous data sources are key in the emerging networked world. In this paper we discuss the initial results of a formal investigation into the underpinnings of technologies for...
2006 / George H.L. Fletcher, Catharine M. Wyss, Edward L. Robertson, Dirk Van Gucht -
An Aspect-Oriented Approach to Modular Behavioral Specification
Abstract Behavioral interface specification languages, such as Java Modeling Language (JML), can be used to specify the behavior of program modules. We have developed a behavioral interface specification language Moxa, an extension of JML. Moxa...
2006 / Kiyoshi Yamada, Takuo Watanabe -
MMC: the Mono Model Checker
Abstract The Mono Model Checker (mmc) is a software model checker for cil bytecode programs. mmc has been developed on the Mono platform. mmc is able to detect deadlocks and assertion violations in cil programs. The design of mmc is inspired by the...
2007 / Theo C. Ruys, Niels H.M. Aan de Brugh -
A Trace Logic for Local Security Properties
Abstract We propose a new simple trace logic that can be used to specify local security properties, i.e. security properties that refer to a single participant of the protocol specification. Our technique allows a protocol designer to provide a...
2005 / Ricardo Corin, Sandro Etalle, Pieter Hartel, Antonio Durante -
Expressing Priorities and External Probabilities in Process Algebra via Mixed Open/Closed Systems
Abstract Defining operational semantics for a process algebra is often based either on labeled transition systems that account for interaction with a context or on the so-called reduction semantics: we assume to have a representation of the whole...
2008 / Mario Bravetti -
Design and Implementation of KSP on the Next Generation Cryptography API
Abstract With good seamless connectivity and higher safety, KSP (Key Storage Providers) is the inexorable trend of security requirements and development to take the place of CSP (Cryptographic Service Provider). But the study on KSP has just started ...
2012 / Zhang Lina -
Research on the Comparability of Multi-attribute Evaluation Methods for Academic Journals
Abstract This paper first constructs a classification framework for multi-attribute evaluation methods oriented to academic journals, and then discusses the comparability of the vast majority of non-linear evaluation methods and the majority of...
2012 / Yu Liping -
Automatic extraction of mathematical terms for precalculus
Abstract In this work, we present the results of research for evaluating a methodology for extracting mathematical terms for precalculus using the techniques for semantically-oriented statistical search. We use the corpus-based approach and the...
2012 / Velislava Stoykova, Ekaterina Petkova -
A Combined Approach for Face Detection with 3D Mesh and Eigen Face
Abstract The new trend used in face recognition is 3D model, which predicates to provide more preciseness. The face geometry is changed drastically as the result of face expressions conceding in poor output of the procedure. Accordingly we initiate...
2012 / M.V. Priya, R. Narayanan, M. Sivaa, R. Sudhakar, N.R. Raajan -
A Method for Decomposition of Fuzzy Formal Context
Abstract Recently, fuzzy FCA becomes popular in researchers for representing the knowledge precisely. In this study we present a method for decomposition of given fuzzy formal context into several crisp formal contexts with help of distinct granules ...
2012 / Prem Kumar Singh, Ch. Aswani Kumar -
Automatic Building Extraction Using Advanced Morphological Operations and Texture Enhancing
Abstract Satellite images are promising data sources for map generation and updating of available maps to support activities and missions of government agencies and consumers. Full exploitation of these data sources depends on automatic techniques...
2012 / M.A. Niveetha, R. Vidhya -
Neural Network Classifier for Automatic Surveillance System
Abstract In this paper we describe a home security system based on Neural Network Classifier. Images were taken in uncontrolled indoor environment using video cameras of various qualities. Database contains 4,005 static images (in visible and...
2012 / A.K. Junoh, M.N. Mansor, S.A. Abu, W.Z. Wan Ahmad, A.Z. Mukhtar, et al. -
Partitioning and Internetworking Wireless Mesh Network with Wired Network for Delivery Maximization and QoS Provisioning
Abstract Wireless mesh architecture is a first step towards providing high-bandwidth network coverage. This architecture has major drawback of losing bandwidth over multiple hops thereby resulting in poor quality of service (QoS) at nodes separated...
2012 / Soma Pandey, Vijay Pande, Govind Kadambi, Stephen Bate -
Accelerated Optical Flow Function Algorithm Using Compute Unified Device Architecture
Abstract This paper describes sum of absolute differences (SAD) algorithm to calculate optical flow function. This algorithm is used for optical flow estimation between two frames of colored photo image. The algorithm is combined with parallel...
2012 / Mohd Zafran bin Abdul Aziz, Petrus Simon Anak Ibai, Syed Farid Syed Adnan, Mohd Saufy Rohmad, Ahmad Khushairy Bin Makhtar, et al.