Computer and information sciences topic list of research papers
-
Taking advantage of the Mobicents platform in the design of the SINGA environment
Abstract This paper describes an architecture that was designed to enable access to the scenarios/challenges on the SINGA platform. SINGA is a virtual platform that enables children facing barriers of access to information, services and people to...
2011 / Nomusa Dlodlo, JP Tolmay -
Context based clearing procedure: A niching method for genetic algorithms
Abstract In this paper we present CBC (context based clearing), a procedure for solving the niching problem. CBC is a clearing technique governed by the amount of heterogeneity in a subpopulation as measured by the standard deviation. CBC was tested ...
2010 / Magda B. Fayek, Nevin M. Darwish, Mayada M. Ali -
Efficient resource discovery in self-organized unstructured peer-to-peer networks2008 / Lu Liu, Nick Antonopoulos, Stephen Mackin, Jie Xu, Duncan Russell
-
Mathematical statistics and computer vision
Abstract In this discussion paper, I present my views on the role on mathematical statistics for solving computer vision problems.
2012 / Rama Chellappa -
An Isomorph-Free SEM-Like Enumeration of Models
Abstract We investigate the integration of the enumeration of finite models of a formula, including unit propagation and pruning mechanisms, as provided by the system SEM, into McKay's general method of isomorph-free exhaustive enumeration. The two...
2005 / Thierry Boy de la Tour, Prakash Countcham -
On Dynamic Distribution of Private Keys over MANETs
Abstract Identity-Based cryptography has been proposed in mobile ad-hoc networks (MANETs) to provide security. However, the figure of the Private Key Generator (PKG) is not adequate in the MANET setting, since it may not be reachable by all nodes,...
2007 / Vanesa Daza, Paz Morillo, Carla Ràfols -
SAT-based Verification for Timed Component Connectors
Abstract Component-based software construction relies on suitable models underlying components, and in particular the coordinators which orchestrate component behaviour. Verifying correctness and safety of such systems amounts to model checking the...
2009 / Stephanie Kemper -
Medvedev Degrees of Generalized R.E. separating Classes
Abstract Important examples of Π 1 0 classes of functions f ...
2007 / Douglas Cenzer, Peter G. Hinman -
Completeness and Counter-Example Generations of a Basic Protocol Logic
Abstract We give an axiomatic system in first-order predicate logic with equality for proving security protocols correct. Our axioms and inference rules derive the basic inference rules, which are explicitly or implicitly used in the literature of...
2006 / Koji Hasebe, Mitsuhiro Okada -
Towards Merging PlatΩ and PGIP
Abstract The PGIP protocol is a standard, abstract interface protocol to connect theorem provers with user interfaces. Interaction in PGIP is based on ASCII-text input and a single focus point-of-control, which indicates a linear position in the...
2009 / David Aspinall, Serge Autexier, Christoph Lüth, Marc Wagner -
Beta-binders for Biological Quantitative Experiments
Abstract The similarities between biological systems and distributed and mobile systems suggest that the theory of process calculi could be a useful starting point for understanding, if not predicting, the behaviour of complex biological systems. ...
2006 / P. Degano, D. Prandi, C. Priami, P. Quaglia -
Logiweb
Abstract This paper presents a software system with the preliminary name “Logiweb” which is an attempt to design a simple, coherent, all-embracing system for archiving, retrieval, transmission, distribution, verification, and presentation of...
2004 / Klaus Grue -
An RDF Query Language based on Logic Programming
Abstract In this paper we investigate an extension of XQuery for querying (and inferring) from RDF documents. Following a graph based approach for specifying queries against RDF, XQuery is extended with construction of answers and boolean predicates ...
2008 / Jesús M. Almendros-Jiménez -
Modelling Calculi with Name Mobility using Graphs with Equivalences
Abstract In the theory of graph rewriting, the use of coalescing rules, i.e., of rules which besides deleting and generating graph items, can coalesce some parts of the graph, turns out to be quite useful for modelling purposes, but, at the same...
2007 / Paolo Baldan, Fabio Gadducci, Ugo Montanari -
A Formal Approach for Analysis and Testing of Reliable Embedded Systems
Abstract In this paper, a framework for the specification of embedded systems described as ‘predicated’ extended finite state machines (p-EFSMs) is proposed. Compared to simple FSMs, p-EFSMs allow the control flow and the data flow description of...
2005 / Abdelaziz Guerrouat, Harald Richter -
A Change-based Approach to Software Evolution
Abstract Software evolution research is limited by the amount of information available to researchers: Current version control tools do not store all the information generated by developers. They do not record every intermediate version of the...
2006 / Romain Robbes, Michele Lanza -
Support Vector Machine Algorithm for Real-Time Detection of VF Signals
Abstract An algorithm for detecting ventricular fibrillation (VF) by the method of support vector machine is presented. The algorithm first extracts the feature of electrocardiogram in every 4s sliding window by the improved time delay method and...
2011 / Chunyun Zhang, Jie Zhao, Fei Li, Huilin Jia, Jie Tian -
Vehicle Interior Sound Quality Prediction Based on Back Propagation Neural Network
Abstract Conduct interior vehicle acoustic quality evaluation to improve automobile comfort is very important significance. This paper introduces the BP neural network application in the vehicle acoustic quality prediction, and set up a sound...
2012 / Gang-Ping Tan, Deng-Feng Wang, Qian Li -
A hierarchy of polynomial time lattice basis reduction algorithms
Abstract We present a hierarchy of polynomial time lattice basis reduction algorithms that stretch from Lenstra, Lenstra, Lovász reduction to Korkine–Zolotareff reduction. Let λ(L) be the length of a shortest nonzero element of a lattice L. We...
2002 / C.P. Schnorr -
An Integrated Approach for Supplier Selection
Abstract This research is emphasized to develop a quantitative approach for assessing supply chain resilience under disruption environment, which incorporates an analytical framework in supply chain design. A three-stage framework is developed on...
2012 / Anupam Haldar, Debamalya Banerjee, Amitava Ray, Surojit Ghosh