Computer and information sciences topic list of research papers
-
A Fuzzy Weibull model with application in stocks optimization
Abstract In the fuzzy neural networks’ applications the membership functions μ_A (t) are selected from a standardized sequence of fuzzy sets without any modification depending on the class of problems to be solved using these procedures. In this...
2011 / Campean Emilia, Morar Liviu, Blaga Lucia -
Computer-Aided Valuation of Safety Management
A procedure is presented for assessing the quality of safety management. It is based on a set of questions concerning areas of relevance which have to be answered with value statements. Since such statements are vague, they are represented by fuzzy numbers. Hence...
2002 / U. Hauptmanns -
Spiking neural network-based control chart pattern recognition
Abstract Due to an increasing competition in products, consumers have become more critical in choosing products. The quality of products has become more important. Statistical Process Control (SPC) is usually used to improve the quality of products. ...
2012 / Medhat H.A. Awadalla, M. Abdellatif Sadek -
Cadre Information Management System Design and Implementation of People's Bank
Abstract This paper proposed the architecture design and implementation plan for the Cadre Information Management System Design and Implementation of People's Bank based on B/S structure. In addition this paper introduced the implementation method...
2011 / Feng Wanli, Zhuang Jun, Zhou Hong -
Global maps of science based on the new Web-of-Science categories2012 / Loet Leydesdorff, Stephen Carley, Ismael Rafols
-
Notes Towards a Semantics for Proof-search
Abstract Algorithmic proof-search is an essential enabling technology throughout informatics. Proof-search is the proof-theoretic realization of the formulation of logic not as a theory of deduction but rather as a theory of reduction. Whilst...
2005 / David J. Pym -
Data Reverse Engineering of Legacy Databases to Object Oriented Conceptual Schemas
Abstract This paper presents a solution and a methodology to recover legacy databases of most DBMS using formal-method based techniques. These formal methods (terms rewriting systems) are applied during the data reverse engineering process and allow ...
2004 / J. Pérez, I. Ramos, V. Anaya, J.M. Cubel, F. Domínguez, et al. -
Evidence Theory and VPRS model
Abstract The Rough Set Theory (RST) was proposed by Pawlak [4] as a new mathematical approach to deal with uncertain knowledge in expert systems. In 1991 Ziarko [11] proposed the Variable Precision Rough Set Model (VPRSM) as a certain extension of...
2004 / Barbara Marszał-Paszek, Piotr Paszek -
Conclusion
Abstract This document is one of the parts of the electronic version of the PhD thesis by S.F.M. van Vlijmen [91]. The goal of the PhD project was to get a better understanding of the problems with the integration of formal specification technique...
2005 / S.F.M. van Vlijmen -
A Programming Language for the Interval Geometric Machine
Abstract This paper presents an interval version of the Geometric Machine Model (GMM) and the programming language induced by its structure. The GMM is an abstract machine model, based on Girard's coherence space, capable of modelling sequential,...
2004 / Renata Hax Sander Reiser, Antônio Carlos da Rocha Costa, Graçaliz Pereira Dimuro -
Algebras, Coalgebras, Monads and Comonads
Abstract Whilst the relationship between initial algebras and monads is well-understood, the relationship between final coalgebras and comonads is less well explored. This paper shows that the problem is more subtle and that final coalgebras can...
2004 / Neil Ghani, Christoph Lüth, Federico de Marchi, John Power -
A Selective CPS Transformation
Abstract The CPS transformation makes all functions continuation-passing, uniformly. Not all functions, however, need continuations: they only do if their evaluation includes computational effects. In this paper we focus on control operations, in...
2004 / Lasse R. Nielsen, Brics -
UML Modeling for Regression Testing of Component Based Systems
Abstract Selection of test cases for regression testing of Component-Based Software Systems is a difficult problem since source code of commercial-off-the-shelf (COTS) components are not often available. This paper demonstrates a UML model of...
2004 / A.S.M. Sajeev, Bugi Wibowo -
The essence of Petri nets and transition systems through Abelian groups
Abstract In this paper we describe an abstract and (as we hope) a uniform frame for Petri net models, which enable to generalise algebra as well as enabling rule used in the dynamics of Petri nets. Our approach of such an abstract frame is based on...
2005 / Gabriel Juhás -
MBase: Representing mathematical Knowledge in a Relational Data Base
Abstract We describe the current (v.0.1) data model of the MBase system, a web-based, distributed mathematical knowledge base. This system is a mathematical service in MathWeb that offers a universal repository of formalized mathematics where the...
2005 / Andreas Franke, Michael Kohlhase -
On the need for a different backtracking rule when dealing with late evaluation
Abstract Constraint Satisfaction Problems (CSPs) represent a widely used framework for many real-life problems. Constraint Logic Programming (CLP) languages are an effective tool for modeling problems in terms of CSPs and solving them efficiently. ...
2005 / Marco Gavanelli, Michela Milano -
A High-level Petri Net Based Approach for Modeling and Composition of Web Services
Abstract Web services are modular, self-describing, self-contained and loosely coupled applications, which intercommuni-cate via messages exchanging. The evolution of the internet and the emergence of new technologies like e-business have influenced ...
2012 / Sofiane Chemaa, Faycal Bachtarzi, Allaoua Chaoui -
Optimal deadlines for agreements2012 / Ettore Damiano, Hao Li, Wing Suen
-
On modeling context-aware social collaboration processes
Abstract Modeling collaboration processes is a challenging task. Existing modeling approaches are not capable of expressing the unpredictable, non-routine nature of human collaboration, which is influenced by the social context of involved...
2013 / Vitaliy Liptchinsky, Roman Khazankin, Stefan Schulte, Benjamin Satzger, Hong-Linh Truong, et al. -
A Fast Data Protection Technique for Mobile Agents to Avoid Attacks in Malicious Hosts
Abstract Mobile agents have been considered a promising technology to develop e-commerce applications, however the security concerns about the technology have stopped its widespread use. The identified security areas comprise...
2004 / Jesús Arturo Pérez Díaz, Darío Álvarez Gutiérrez