Computer and information sciences topic list of research papers
-
A secure distance-based RFID identification protocol with an off-line back-end database2011 / Pedro Peris-Lopez, Agustin Orfila, Esther Palomar, Julio C. Hernandez-Castro
-
Knowledge work and communication challenges in networked enterprises2010 / Joseph Barjis, Ashish Gupta, Ramesh Sharda
-
Efficient priority schemes for the provision of end-to-end quality of service for multimedia traffic over MPLS VPN networks
Abstract In this paper, a VPN network simulation model will be built using the MPLS protocol and based on an existing network. Various queueing policies will be implemented to evaluate the provision of the end-to-end QoS requirements for various...
2012 / Nasser-Eddine Rikli, Saad Almogari -
Why ever CSP?
Abstract The original theoretical model of Communicating Sequential Processes owed its inspiration to the achievements of Milner, Scott and Dijkstra. It was developed at around the time of the publication of Milner's Calculus of Communicating...
2006 / Tony Hoare -
Preface2009 / Serge Autexier, Christoph Benzmüller
-
The GTO Toolset and Method
Abstract A suitable method supported by a toolset with a high degree of automation is a necessity for the successful employment of formal methods in industrial projects. The GTO toolset and method have been developed, and successfully applied, to...
2007 / Lars-Henrik Eriksson -
Extending Symmetry Reduction Techniques to a Realistic Model of Computation
Abstract Much of the literature on symmetry reductions for model checking assumes a simple model of computation where the local state of each component in a concurrent system can be represented by an integer, and where components do not hold...
2007 / Alastair F. Donaldson, Alice Miller -
Efficiently Representing Existential Dependency Sets for Expansion-based QBF Solvers
Abstract Given a quantified boolean formula (QBF) in prenex conjunctive normal form (PCNF), we consider the problem of identifying variable dependencies. In related work, a formal definition of dependencies has been suggested based on quantifier...
2009 / Florian Lonsing, Armin Biere -
Admissible Representations of Probability Measures
Abstract In a recent paper, probabilistic processes are used to generate Borel probability measures on topological spaces X that are equipped with a representation in the sense of Type-2 Theory of Effectivity. This gives rise to a natural...
2007 / Matthias Schröder -
Preface2009 / Alessandro Aldini, Maurice ter Beek, Fabio Gadducci
-
Presenting Dcpos and Dcpo Algebras
Abstract Dcpos can be presented by preorders of generators and inequational relations expressed as covers. Algebraic operations on the generators (possibly with their results being ideals of generators) can be extended to the dcpo presented,...
2008 / Achim Jung, M. Andrew Moshier, Steve Vickers -
Simulating the future of concept-based video retrieval under improved detector performance2011 / Robin Aly, Djoerd Hiemstra, Franciska de Jong, Peter M. G. Apers
-
Final Year Supervision Management System as a Tool for Monitoring Computer Science Projects
Abstract In Computer Science Program run by Universiti Kebangsaan Malaysia, students are required to develop a software prototype and write a dissertation for their final year project. Preliminary observation has shown that for the last five years,...
2011 / Marini Abu Bakar, Norleyza Jailani, Zarina Shukur, Noor Faezah Mohd Yatim -
Improvements On The Distance of One-Point Codes Using Places of Higher Degree
Abstract In (IEEE Trans. Inform. Theory 51 no.4(2005),1590-1593), Matthews and Michel construct one-point codes by using a place of degree (greater than one), which improve some one-point codes over the much-studied one-point Hermitian codes. In...
2011 / Wanbao Hu, Zhen Wang -
Auditory Cryptography Security Algorithm With Audio Shelters
Abstract In this paper, auditory cryptography security algorithm with audio shelters is proposed. The meaningful audio watermarking is pretreated to high-fidelity binary audio, and the binary audio is encrypted to n cryptographic audios by (k, n)...
2011 / Huan Li, Zheng Qin, Xuanping Zhang, Xu Wang -
Privacy protection for speech signals
Abstract In this paper, we describe about some privacy protection techniques for speech signals captured by public sensors. Speech signal includes the privacy information, such as “voice characteristics” and “linguistic privacy information.” We try...
2010 / Kazumasa Yamamoto, Tsuchiya Masatoshi, Seiichi Nakagawa -
Associative memory of phase-coded spatiotemporal patterns in leaky Integrate and Fire networks2012 / Silvia Scarpetta, Ferdinando Giacco
-
Fault Diagnosis with Orthogonal Compactors in Scan-Based Designs2011 / Brady Benware, Grzegorz Mrugalski, Artur Pogiel, Janusz Rajski, Jędrzej Solecki, et al.
-
Kolmogorov Complexity for Possibly Infinite Computations2005 / Verónica Becher, Santiago Figueira
-
Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS2007 / Berkant Ustaoglu