Computer and information sciences topic list of research papers
-
Medical Image Fusion using Combined Discrete Wavelet and Ripplet Transforms
Abstract Medical images like CT and MRI provide complementary information. These images need to be fused for proper diagnosis and also for clinical evaluation. This paper proposes a new medical image fusion based on the combined effect of Discrete...
2012 / C.T. Kavitha, C. Chellamuthu, R. Rajesh -
The development of a tool to predict team performance
Abstract The paper describes the development of a tool to predict quantitatively the success of a team when executing a process. The tool was developed for the UK defence industry, though it may be useful in other domains. It is expected to be used...
2011 / M.A. Sinclair, C.E. Siemieniuch, R.A. Haslam, M.J.d.C. Henshaw, L. Evans -
CTL* Model Checking on a Shared-Memory Architecture
Abstract In this paper we present a parallel algorithm for CTL* model checking on a virtual shared-memory high-performance parallel machine architecture. The algorithm is automata-driven and follows a games approach where one player wins if the...
2005 / Cornelia P. Inggs, Howard Barringer -
On the Representation of McCarthy's amb in the π-calculus
Abstract We study the encoding of , the call by name λ-calculus enriched with McCarthy's amb operator, into the π-calculus. Semantically, amb is a challenging operator, for the fairness constraints that ...
2004 / Arnaud Carayol, Daniel Hirschkoff, Davide Sangiorgi -
Extrinsic Calibration of a Camera and a Laser Range Finder using Point to Line Constraint
Abstract In this paper, a novel extrinsic calibration method of a camera and a laser range finder is presented using a calibration cube. The calibration is based on observing three edges of the cube from the camera and three laser points projected...
2012 / Zhen Chen, Liang Zhuo, Kaiqiong Sun, Congxuan Zhang -
A Portable MIMO Testbed and Selected Channel Measurements2006 / Paul Goud Jr., Robert Hang, Dmitri Truhachev, Christian Schlegel
-
Research on the Architecture Model of Volatile Data Forensics
Abstract This paper proposed a new architecture model of volatile data forensic. The model applied to all the volatile data sources is a general model. It can rebuild the evidence data fragment to chains of evidence which contains the behavior...
2012 / Liang Hu, XiaoLu Zhang, Feng Wang, WenBo Wang, Kuo Zhao -
An efficient hardware model for RSA Encryption system using Vedic mathematics
Abstract The standard techniques for providing privacy and security in data networks include encryption/decryption algorithms such as Advanced Encryption System (AES) (private-key) and RSA (public-key). RSA is one of the safest standard algorithms,...
2012 / R. Bhaskar, Ganapathi Hegde, P.R. Vaya -
Image Decomposition of Partly Noisy Images
Abstract In this paper, we firstly propose a new variational model for partly noisy image decomposition by introducing a texture detecting function. Secondly, we prove the existence and uniqueness of minimal solutions of our proposed model. Thirdly, ...
2012 / Ruihua Liu, Ruizhi Jia, Liyun Su -
Error Minimization in Phoneme based Automated Speech Recognition for Similar Sounding Phonemes
Abstract The technology of ASR (Automated Speech Recognition) has been quite successful with the use of Hidden Markov Model (HHM) with the aid of probabilistic and the best path methods. The words with limited vocabulary content can easily be...
2012 / Karan Gangaputra -
Performance Analysis of Web Services on Mobile Devices
Abstract With the recent rapid development of mobile devices in terms of processing power, memory and storage capabilities coupled with the advancements of wireless technology in terms of higher data transmission rates such as 3G and 4G, it has now...
2012 / KamalEldin Mohamed, Duminda Wijesekera -
Efficient Wald Tests for Fractional Unit Roots2007 / Ignacio N Lobato, Carlos Velasco
-
Faceless Componentization in Web Dynpro ABAP - IT Project Management Strategy
Abstract To face the challenges of the modern competitive business environment, the best companies ensure transparency in all the aspects of their work, enabling them to react quickly, with high quality information, efficiency, and flexibility. With ...
2012 / Mihaela Osaci, Adela-Diana Berdie, Ionel Muscalagiu -
Probabilistic Dynamic Deployment of Wireless Sensor Networks by Artificial Bee Colony Algorithm2011 / Celal Ozturk, Dervis Karaboga, Beyza Gorkemli
-
Interactions among dynamic sets of objects2003 / J. Torres, J. A. Ortega, M. Toro
-
Obol: Integrating Language and Meaning in Bio-Ontologies2005 / Christopher J. Mungall
-
Game Semantics for Access Control
Abstract We introduce a semantic approach to the study of logics for access control and dependency analysis, based on Game Semantics. We use a variant of AJM games with explicit justification (but without pointers). Based on this, we give a simple...
2009 / Samson Abramsky, Radha Jagadeesan -
Chosen-name Attacks: An Overlooked Class of Type-flaw Attacks
Abstract In the context of Dolev-Yao style analysis of security protocols, we consider the capability of an intruder to dynamically choose and assign names to agents. This capability has been overlooked in all significant protocol verification...
2008 / Pieter Ceelen, Sjouke Mauw, Saša Radomirović -
Mining Propositional Simplification Proofs for Small Validating Clauses
Abstract The problem of obtaining small conflict clauses in SMT systems has received a great deal of attention recently. We report work in progress to find small subsets of the current partial assignment that imply the goal formula when it has been...
2006 / Ian Wehrman, Aaron Stump -
A Verified Compiler for Synchronous Programs with Local Declarations
Abstract We describe the translation of Esterel-like programs with delayed actions to equivalent transition relations and equation systems. Potential schizophrenia problems arising from local declarations are solved by (1) generating copies of the...
2006 / Klaus Schneider, Jens Brandt, Tobias Schuele