Computer and information sciences topic list of research papers
-
Interception Algorithm of S-cubed Signal Model in Stealth Radar Equipment
Abstract Radar equipment of stealth platforms such as aircraft have adopted the newest modern technology to design the signal waveforms. One of the important and effective methods is the hybrid waveform called spread spectrum stretch (S-cubed) which ...
2012 / Xiaodong ZENG, Bin TANG, Ying XIONG -
Preface2011 / Paola Giannini, Jean Krivine
-
The Role of Context in Defining Romanian Equivalents for Russian Terms in the Theory of Translation
Abstract The present paper is based on the materials obtained while translating “Introduction to the theory of translation” by A.V. Fedorov in Romanian language. Defining equivalents for specific terms brought along a number of difficulties, most of ...
2013 / Valentina Shiryaeva, Georgiana Lungu Badea -
Tool Building Requirements for an API to First-Order Solvers
Abstract Effective formal verification tools require that robust implementations of automatic procedures for first-order logic and satisfiability modulo theories be integrated into expressive interactive frameworks for logical deduction, such as...
2006 / Jim Grundy, Tom Melham, Sava Krstić, Sean McLaughlin -
The COCA quality model for user documentation2014 / Bartosz Alchimowicz, Jerzy R. Nawrocki
-
Potential Advantages and Disadvantages of Multiplatform Development Frameworks–A Vision on Mobile Environments
Abstract In this paper, we present a position on potential advantages and disadvantages that may rise after the utilization of multiplatform frameworks for creating mobile applications. Mobile frameworks evolve to offer solutions that allow to...
2012 / Luis Corral, Andrea Janes, Tadas Remencius -
Preface2005 / Ruy de Queiroz, Patrick Cégielski
-
Execution Management and Efficient Resource Provisioning for Flood Decision Support
Abstract We present a resource provisioning and execution management solution for a flood decision support system. The system, developed within the ISMOP project, features an urgent computing scenario in which flood threat assessment for large...
2015 / Bartosz Balis, Marek Kasztelnik, Maciej Malawski, Piotr Nowakowski, Bartosz Wilk, et al. -
An Improved Algorithm of CSP
Abstract According to the constraint satisfaction problems, their algorithm are discussed and analyzed in detail, an improved efficiency backtracking algorithm of minimum residual heuristic value and forward test (MRV + FC) is proposed. The...
2012 / Caihong Zhao, Yanyan Cui -
A High Definition Motion JPEG Encoder Based on Epuma Platform
Abstract The ePUMA is a novel parallel DSP platform based on master-multi-SIMD architecture. The essential technology is to use separated data access kernels and algorithm kernels to minimize the communication overhead of parallel processing by...
2012 / Yanjun Zhang, Wenbiao Zhou, Zhenyu Liu, Siye Wang, Dake Liu -
Hidden Markov Model for Shortest Paths Testing to Detect a Wormhole Attack in a Localized Wireless Sensor Network
Abstract The wormhole attack is one of the most popular and serious attacks in Wireless sensor networks and most proposed protocols to defend against this attack use extra hardware which impacts highly on the cost of implementation as well causing...
2012 / Victor Obado, Karim Djouani, Yskandary Hamam -
A Decidable Clock Language for Synchronous Specifications
Abstract Presence and absence of signals inside a reaction are inherent to the synchronous paradigm. Clocks are sets of instants (indicating for example when a signal is present) mainly used to describe the control part of data-flow specifications....
2005 / Mirabelle Nebut, Sophie Pinchinat -
Energy Constrained Positioning in Mobile Wireless Ad hoc and Sensor Networks
Abstract The positioning of wireless nodes has been an active research area over the last decade. Many network positioning algorithms have been proposed to solve this problem. The vast majority assume that a fixed set of nodes (called seeds) have a...
2013 / Stuart MacLean, Suprakash Datta -
An agent-based framework for performance modeling of an optimistic parallel discrete event simulator2013 / Aditya Kurve, Khashayar Kotobi, George Kesidis
-
People Counting at Campuses
Abstract People counting systems aim at automatically estimating the number of people indoor and outdoor places. They are widely used in retail environment; determining conversion ratio, advertising and promotional evaluations. And they can be used...
2015 / H. Hakan Cetinkaya, Muammer Akcay -
Preface2005 / Jean-Marie Favre, Mike Godfrey, Andreas Winter
-
Preface2007 / Sandro Etalle, Pierangela Samarati
-
A Contribution to a Virtual Enterprise Taxonomy
Abstract This paper presents a taxonomy able to contribute to building a framework within the domain of Virtual Enterprises (VE). A VE taxonomy currently does not exist, and this lack is felt in the ambiguous way that some concepts are addressed,...
2014 / Goran D. Putnik, Maria Manuela Cruz-Cunha -
A Model-Theoretic Description of Tree Adjoining Grammars1 1The research presented in this paper was supported by the Deutsche Forschungsgemeinschaft within the Sonderforschungsbereich 441, TP A2. The authors wish to thank Jens Michaelis and Stephan Kepser for helpful comments.
Abstract In this paper we show that non-context-free phenomena can be captured using only limited logical means. In particular, we show how to encode a Tree Adjoining Grammar [16] into a weakly equivalent monadic context-free tree grammar (MCFTG)....
2005 / Frank Morawietz, Uwe Mönnich -
Negated bio-events: analysis and identification2013 / Raheel Nawaz, Paul Thompson, Sophia Ananiadou