Computer and information sciences topic list of research papers
-
Lexical and Morphological Dissociations Between Nouns and Verbs: Behavioral and Neuroanatomical Data2010 / Annalisa Benetello, Chiara Finocchiaro, Rita Capasso, Stefano Magon, Gabriele Miceli
-
Sustainable Supplier Selection based on Self-organizing Map Neural Network and Multi Criteria Decision Making Approaches
Abstract Due to increasing public awareness, government regulation and market pressure on sustainability issues, companies have found out that in order to have a competitive edge, sustainable operational activities should be adopted with their...
2013 / Amir Hossein Azadnia, Muhamad Zameri Mat Saman, Kuan Yew Wong, Pezhman Ghadimi, Norhayati Zakuan -
Nodal distances for rooted phylogenetic trees2009 / Gabriel Cardona, Mercè Llabrés, Francesc Rosselló, Gabriel Valiente
-
Reversible Watermarking Techniques: An Overview and a Classification2010 / Roberto Caldelli, Francesco Filippini, Rudy Becarelli
-
Watermarking Images in the Frequency Domain by Exploiting Self-Inverting Permutations2013 / Maria Chroni, Angelos Fylakis, Stavros D. Nikolopoulos
-
ALPINe: Another Location Privacy Information Network
Abstract A portable device user, Alice, is travelling and wishes to get local information on points of interest (e.g. restaurants, hotels) from a location based service, but without a violation of her privacy. Furthermore, Alice wishes to maintain a ...
2011 / Jean-Charles Gŕegoire, Ang‘ele M. Hamel -
Optimal Power Consumption in Cooperative WSNs for a random Distance using a linear propagation model
Abstract Many challenges confront the wide deployment of wireless communications such as signal attenuation, fading and shadowing. Those problems are solved by adopting cooperative communication technique that mimics MIMO technology (virtual MIMO)....
2011 / Wail Mardini, Yaser Khamayseh, Marwa Salayma -
The Personalized Information Retrieval Model Based on User Interest
Abstract Personalized information retrieval systems can help customers to gain orientation in information overload by determining which items are relevant for their interests. One type of information retrieval is content-based filtering. In...
2012 / Songjie Gong -
Analysis on Multicast Routing Protocols for Mobile Ad Hoc Networks
Abstract As the Mobile Ad Hoc Networks technologies face a series of challenges like dynamic changes of topological structure, existence of unidirectional channel, limited wireless transmission bandwidth, the capability limitations of mobile...
2012 / Ma Xiang -
Classification Algorithms Research on Facial Expression Recognition
Abstract In order to improve the reliability of facial expression recognition system, and reduce the chance of false positives caused by error, classification strategy is important in recognition process. In the process, the k-nearest neighbor...
2012 / Jun Ou -
Challenges of CAC in Heterogeneous Wireless Cognitive Networks
Abstract Call admission control (CAC) is known as an effective functionality in ensuring the QoS of wireless networks. The vision of next generation wireless networks has led to the development of new call admission control (CAC) algorithms...
2012 / Jiazheng Wang, Xiuhua Fu -
An Assessment of WiMax Security2010 / Sanjay P. Ahuja, Nicole Collier
-
Preface2005 / Luca de Alfaro
-
ProTest: An Automatic Test Environment for B Specifications
Abstract We present ProTest, an automatic test environment for B specifications. B is a model-oriented notation where systems are specified in terms of abstract states and operations on abstract states. ProTest first generates a state coverage graph ...
2005 / Manoranjan Satpathy, Michael Leuschel, Michael Butler -
Preface2004 / Martín Escardó, Achim Jung
-
Positive Logic with Adjoint Modalities: Proof Theory, Semantics and Reasoning about Information
Abstract We consider a simple modal logic whose non-modal part has conjunction and disjunction as connectives and whose modalities come in adjoint pairs, but are not in general closure operators. Despite absence of negation and implication, and of...
2009 / Mehrnoosh Sadrzadeh, Roy Dyckhoff -
Explicit Contexts in LF (Extended Abstract)
Abstract The standard methodology for representing deductive systems in LF identifies the object's language's context with the LF context. Consequently, any variable dealt with explicitly by any judgement or metatheorem must be last in the context....
2009 / Karl Crary -
Composition of Services with Constraints
Abstract Composition of Web services consists of the interleaving of the sequence of actions executed by the elementary services in accordance with a client specification. We model Web services as automata executing actions and also sending and...
2010 / Philippe Balbiani, Fahima Cheikh Alili, P.-C. Héam, Olga Kouchnarenko -
A Verified Shared Capability Model
Abstract This paper presents a high-level access control model of the seL4 microkernel. We extend an earlier formalisation by Elkaduwe et al with non-determinism, explicit sharing of capability storage, and a delete-operation for entities. We...
2009 / Andrew Boyton -
Preface2006 / Florence Maraninchi, Alain Girault, Marc Pouzet