Computer and information sciences topic list of research papers
-
Omega-3 Fatty Acid Intervention Suppresses Lipopolysaccharide-Induced Inflammation and Weight Loss in Mice2015 / Ying-Hua Liu, Xiang-Yong Li, Chih-Yu Chen, Hong-Man Zhang, Jing Kang
-
Developing Ontologies and Persona to Support and Enhance Requirements Engineering Activities – A Case Study
Abstract This paper provides an insight into incorporating persona concept and developing ontologies to support requirements engineering activities via a university course registration web application system case study. The objectives are to examine ...
2015 / Wee Wee Sim, Peggy Brouse -
Exact Algorithms for Intervalizing Coloured Graphs2015 / Hans L. Bodlaender, Johan M. M. van Rooij
-
Interest communities and flow roles in directed networks: the Twitter network of the UK riots2014 / M. Beguerisse-Diaz, G. Garduno-Hernandez, B. Vangelov, S. N. Yaliraki, M. Barahona
-
The use of network theory to model disparate ship design information2015 / Douglas Rigterink, Rebecca Piks, David J. Singer
-
Context-aware Multi-agent System in Machine-to-Machine Communication
Abstract Machine-to-Machine (M2M) communication refers to communication among machines without or with only limited human inter- vention. The paper deals with context-awareness in M2M communication and proposes rich presence information as a concept ...
2014 / Hrvoje Maracic, Tihana Miskovic, Mario Kusek, Ignac Lovrek -
A Rolling Stock Circulation Model for Railway Rapid Transit Systems
Abstract Rolling stock is one of the key operational issues for a railway transportation company. In fact, rolling stock and infrastructure maintenance suppose about 75% of total cost for a typical railway network. Rolling stock circulation consists ...
2014 / David Canca, Manuel Sabido, Eva Barrena -
Five Traits of Performance Enhancement Using Cloud Robotics: A Survey
Abstract Recently, robots and automation systems have been at the front of research with the majority of systems still operating indepen- dently using onboard computation, memory manipulation and communication. With improvements in communication...
2014 / Basit Qureshi, Anis Koubâa -
Zing Database: high-performance key-value store for large-scale storage service2014 / Thanh Trung Nguyen, Minh Hieu Nguyen
-
Exploiting Bayesian Networks for the Analysis of Combined Attack Trees
Abstract The growing need to find proper countermeasures able to protect critical infrastructures from threats has addressed the definition of quantitative methodologies for risk assessment. One of the most difficult aspects in this topic is the...
2015 / Marco Gribaudo, Mauro Iacono, Stefano Marrone -
A survey on the application of recurrent neural networks to statistical language modeling
Abstract In this paper, we present a survey on the application of recurrent neural networks to the task of statistical language modeling. Although it has been shown that these models obtain good performance on this task, often superior to other...
2014 / Wim De Mulder, Steven Bethard, Marie-Francine Moens -
Crowd Simulation for Dynamic Environments based on Information Spreading and Agents’ Personal Interests
Abstract In this work a novel crowd simulation framework that incorporates information of the dynamic environment is introduced. It supports knowledge spreading and allows the simulated agents to behave according to their personal needs that are...
2014 / Konrad Jablonski, Vasileios Argyriou, Darrel Greenhill -
Ecolingua: a Formal ontology for data in ecology2010 / Virgínia Brilhante
-
Quantum Clock Synchronization with a Single Qudit2015 / Armin Tavakoli, Adán Cabello, Marek Żukowski, Mohamed Bourennane
-
Greedy Heuristics for Distributed Job Shop Problems
Abstract This paper studies the problem of scheduling distributed job shops where the classical single-facility job shop is extended to the multi-facility one. The problem is mathematically formulated by a mixed integer linear programming model. The ...
2014 / Ahmed Azab, B. Naderi -
Trust-based Voting Method for Efficient Malware Detection
Abstract The internet plays an important role in all areas of society from the economy to the government. Security means permitting things you do want, while preventing things you don’t want from performing. Computer security means storing the...
2016 / Shraddha S. More, Pranit P. Gaikwad -
Assessment of Application Technology of Natural User Interfaces in the Creation of a Virtual Chemical Laboratory2014 / Piotr Jagodziński, Robert Wolski
-
Solving Air Transport Contingencies by Using Genetic Algorithms – RUCCMAN
Abstract Transportation networks are dynamic systems that suffer continuous unexpected events. People in charge of managing them in an efficient way usually make their decisions based on their personal expertise, relevant data and the accumulated...
2014 / José Manuel Rísquez Fernández, Mario Redondo Sánchez, José Julián Gómez Lorenzo, Santiago Timón Reina -
Performance testing (Load) of web applications based on test case management
Summary This paper includes the importance of performance testing of web applications and analyses the application's bottleneck based on hardware, software and resource utilization. The main focus of this paper is performance testing based on load...
2016 / Rijwan Khan, Mohd Amjad -
Linked hypernyms: Enriching DBpedia with Targeted Hypernym Discovery
Abstract The Linked Hypernyms Dataset (LHD) provides entities described by Dutch, English and German Wikipedia articles with types in the DBpedia namespace. The types are extracted from the first sentences of Wikipedia articles using Hearst pattern...
2014 / Tomáš Kliegr