Computer and information sciences topic list of research papers
-
The Countable Character of Uncountable Graphs2004 / François Laviolette
-
Categories of Timed Stochastic Relations
Abstract Stochastic behavior—the probabilistic evolution of a system in time—is essential to modeling the complexity of real-world systems. It enables realistic performance modeling, quality-of-service guarantees, and especially simulations for...
2009 / Daniel Brown, Riccardo Pucella -
Constrained Simulations, Nested Simulation Semantics and Counting Bisimulations
Abstract Nested simulations define an interesting hierarchy of semantic preorders and equivalences in which every semantics refines the previous one and it is refined by the following. This nested nature provides a fruitful framework for the study...
2008 / David de Frutos Escrig, Carlos Gregorio Rodríguez -
Tree Process Calculus
Abstract We extend Robin Milner's sequential process calculus to tree process calculus in a way similar to that tree automata extend word automata. By this way, we establish a sound and complete inference system which describes the equivalence via...
2008 / Mingren Chai, Nan Qu, Ying Jiang -
On Metric Temporal Łukasiewicz Logic
Abstract In this paper we present a logical framework to cope with temporal reasoning under vagueness. The calculus is obtained by extending that of bounded metric temporal logic over a dense time domain, by truth-values from the rational unit...
2009 / Tommaso Flaminio, Elisa B.P. Tiezzi -
New Evaluation Commands for Maude Within Full Maude
Abstract Maude is able to deal with infinite data structures and avoid infinite computations by using strategy annotations. However, they can eventually make the computation of the normal form(s) of some input expressions impossible. We have used...
2005 / Francisco Durán, Santiago Escobar, Salvador Lucas -
Gauss: A Framework for Verifying Scientific Computing Software
Abstract High performance scientific computing software is of critical international importance as it supports scientific explorations and engineering. Software development in this area is highly challenging owing to the use of parallel/distributed...
2006 / Robert Palmer, Steve Barrus, Yu Yang, Ganesh Gopalakrishnan, Robert M. Kirby -
Quantitative μ-calculus and CTL Based on Constraint Semirings
Abstract Model checking and temporal logics are boolean. The answer to the model checking question does a system satisfy a property? is either true or false, and properties expressed in temporal logics are defined over boolean propositions. While...
2005 / Alberto Lluch-Lafuente, Ugo Montanari -
Type Theory Should Eat Itself
Abstract In this paper I present a partial formalisation of a normaliser for type theory in Agda [Ulf Norell. Agda 2, 2007. http://www.cs.chalmers.se/~ulfn/]; extending previous work on big-step normalisation [Thorsten Altenkirch and James Chapman....
2009 / James Chapman -
Multi-sensor Data Fusion for Cyber Security Situation Awareness
Abstract To analyze the influence of security incidents on a networked system and accurately evaluate system security, this paper proposes a novel cyber security situation assessment model, based on multi-heterogeneous sensors. By using D-S evidence ...
2011 / Yan Zhang, Shuguang Huang, Shize Guo, Junmao Zhu -
A Smart Displacement Measuring Technique Using Linear Variable Displacement Transducer
Abstract This paper aims to design of a smart displacement measuring technique using Linear Variable Differential Transformer (LVDT). The objectives of this work are to (i) extend the linearity range of LVDT, (ii) eliminate the dependence of...
2012 / K.V. Santhosh, B.K. Roy -
Algorithms for Ternary Number System
Abstract Numbers are counted in twos by machines, and in tens by men. However, there are countably infinite numbers of ways of counting numbers, in general. It has been shown that for optimum number of computations in counting a number, the base-e...
2012 / Subrata Das, Joy Prakash Sain, Parthasarathi Dasgupta, Samar Sensarma -
Relational Database Watermarking for Ownership Protection
Abstract With the widespread popularity of Internet, the use of databases has increased tremendously and theft of the database is a main concern for the database owners. Therefore, it is essential to protect the ownership of the database. In this...
2012 / Udai Pratap Rao, Dhiren R. Patel, Punitkumar M. Vikani -
Optimized Image Watermarking Scheme Based On PSO
Abstract The digital watermarking scheme provides copyright protection to multimedia contents especially to digital images. In this paper a secure optimized watermarking scheme for copyright protection of images using Particle Swarm...
2012 / K. Kuppusamy, K. Thamodaran -
Performance Measures Modeling (PMM) in MANET
Abstract In this paper We are emphasizing on a Mathematical Model which will be denoted as PMM (Performance Measures Model), for computing routing metrics, with the help of this paper have implemented the mathematical model that will be helpful in...
2012 / Pankaj Sharma, Ashok Kumar Sinha -
Menu and Context Based Interfaces Evaluation for Mobile TV
Abstract The dissemination of smartphones and their ability to decode video streams enables users to watch TV possible while on the move. While operators are starting to provide this content type, it is not clear yet how will users adopt these new...
2012 / Cláudio Freire, Luís Correia, Luis Marcelino, Catarina Silva, Carlos Rabadão, et al. -
Inverted File Compression using EGC and FEGC
Abstract Inverted files are most commonly used technique for efficient query processing and fast text searching in Information Retrieval System (IRS). But the size of the inverted files is extremely large due to rapid growth in the size of the data...
2012 / S. Domnic, V. Glory -
Pre-equalization for MIMO Wireless Systems Using Spatial Modulation
Abstract Spatial modulation (SM) has emerged as a very promising method to exploit the potential multiple-input multiple-output system gains using low-complexity transceivers. SM uses the antenna index at the transmitter as an additional source of...
2012 / M.G. González-Pérez, J.M. Luna-Rivera, D.U. Campos-Delgado -
Analog Based Routing Algorithm using Ant Agents for MANETs (ABRAAM)
Abstract A mobile ad hoc network (MANET) is an anthology of wireless mobile hosts forming a short-lived network without the help of any centralized infrastructure. In such an environment, the reliable and shortest path finding between two hosts to...
2012 / K.R. Ramkumar, C.S. Ravichandran -
Face Recognition using Threshold Based DWT Feature Extraction and Selective Illumination Enhancement Technique
Abstract Face recognition (FR) under varying lighting conditions is challenging, and exacting illumination invariant features is an effective approach to solve this problem. In this paper, we propose a novel illumination normalization method called...
2012 / V. Vidya, Nazia Farheen, K. Manikantan, S. Ramachandran