Computer and information sciences topic list of research papers
-
A New Formalism for Modeling a Multi Agent Systems: Agent Petri Nets2011 / Borhen Marzougui, Khaled Hassine, Kamel Barkaoui
-
The Structure of Engineering Project Evaluation System: Model and Analysis
Abstract From the system theory perspective, the paper constructs a structure model of engineering project evaluation system that provides an analysis framework to project evaluation. The model analysis shows that engineering project evaluation...
2011 / Shanbo Li, Qinqin Xiong -
Target Oriented Multiattribute Group Decision Making Approach and Application in Hydroelectric Project Evaluation
Abstract We consider a group decision problem which decision maker is target oriented and value of alternatives’ attributes is random variable. According to different type of targets, we propose a corresponding aggregating approach of group...
2012 / Wenjie Bi, Lei Zhang -
Preservation of knowledge through networking with retirees
Abstract Nuclear organizations, in most countries, have for many years endured a process of a reducing workforce and of a shift of the average age of their technical professionals towards the mid fifties range. Loss of emphasis or phasing down of...
2010 / A.C.O. Barroso, J.S.B. Reis-Junior, C.A. Monteiro, A. Seary -
A metric space approach to the information channel capacity of spike trains2010 / James B. Gillespie, Conor J. Houghton
-
Energy aware improved least and most significant bit arbitration algorithm for WORM tags
Abstract Passive Radio Frequency Identification systems have gained enormous attention and popularity especially after its adoption in time and data critical systems. Theoretically, these systems have the potential to read over 100 tags per second...
2012 / Katheeja Parveen, Sheik Abdul Khader, Munir Ahamed Rabbani -
Cooperative Guidance for Multimissile Salvo Attack
Abstract Cooperative guidance problems of multiple missiles are considered in this article. A cooperative guidance scheme, where coordination algorithms and local guidance laws are combined together, is proposed. This scheme actually builds up a...
2008 / Zhao Shiyu, Zhou Rui -
Conceptual Selective RFID Anti-Collision Technique Management
Abstract Radio Frequency Identification (RFID) uses wireless radio frequency technology to automatically identify tagged objects. Despite the extensive development of RFID technology, tag collisions still remains a major drawback. The collision...
2011 / Prapassara Pupunwiwat, Peter Darcy, Bela Stantic -
Using a Cloud-Hosted Proxy to support Mobile Consumers of RESTful Services
Abstract While mobile handsets have always been heavily used for data communication most notably SMS and basic internet services like email and browsing, they are now beginning to be used increasingly often as platforms for accessing IT resources...
2011 / Shomoyita Jamal, Ralph Deters -
A Secure Platform of Wireless Sensor Networks
Abstract Security was not considered when current wireless sensor nodes were designed. As a result providing high level of security on current WSNs platforms is unattainable, especially against attacks based on key resolving and node compromise. In...
2011 / Abidalrahman Moh‘d, Hosein Marzi, Nauman Aslam, William Phillips, William Robertsona -
Efficient Querying of Distributed RDF Sources in Mobile Settings based on a Source Index Model
Abstract Recent technological developments in the area of mobile devices in combination with the ubiquity of mobile connectivity have turned handheld devices into rich mobile web clients. On the other hand, we witness an increased number of web...
2011 / Elien Paret, William Van Woensel, Sven Casteleyn, Beat Signer, Olga De Troyer -
Initially Researches for the Development of SSME under the Background of IOT
Abstract The Internet Of Things (IOT) is proposed in the 1990s. The original intention has been put forward is people to things and things to things can deliver information like person as. IOT broke the human traditional thinking. This paper...
2012 / Kun Han, Shurong Liu, Dacheng Zhang, Ying Han -
Transfer Error and Correction Approach in Mobile Network
Abstract With the development of information technology and social progress, human demand for information has become increasingly diverse, wherever and whenever people want to be able to easily, quickly and flexibly via voice, data, images and video ...
2012 / Wu Xiao-kai, Shi Yong-jin, Chen Da-jin, Ma Bing-he, Zhou Qi-li -
A New Layout Method Allowing the Overlapped Configuration of Photos
Abstract We propose a new photo summarization system that provides the user with a summarized view of clustered photos. The summarized view provides the following major functions to the user. It selects a representative photo from each clusters. It...
2012 / Chen Xiaobing -
On the Concept of Trusted Computing and Software Watermarking: A Computational Complexity Treatise
Abstract Trusted computing is a new requirement of information security, after the successful modern cryptography. Although there are many developments of methods and techniques to address on the problems of trusted computing, the lack of rigorous...
2012 / Wu Hao, Wu Guoqing -
Towards an Open Learning Environment via Augmented Reality (AR): Visualising the Invisible in Science Centres and Schools for Teacher Education
Abstract The pedagogical principle of this research was making the invisible observable by Augmented Reality [AR]. Small-scale exhibits are bridging the gap between formal education and informal learning. The data (292 teachers) was analysed...
2012 / Hannu Salmi, Arja Kaasinen, Veera Kallunki -
Outlier Identification using Symmetric Neighborhoods
Abstract In recent research, outlier mining has been widely used in areas such as telecommunication, health care, finance and network intrusion detection. By applying outlier mining in network anomaly detection, rarely occurring attacks can be...
2012 / Prasanta Gogoi, B. Borah, D.K. Bhattacharyya, J.K. Kalita -
Data Lifetime Enhancement for Improving QoS in NDN
Abstract Because of the further development of the Internet, the high-speed and image-related services now have occupied most of the network resources. For this reason, the Next Generation Network (NGN) will aim at optimizing ISP networks. Funded by ...
2014 / Tin-Yu Wu, Wei-Tsong Lee, Chien-Yu Duan, Yu-Wei Wu -
On the Failure of Fixed-Point Theorems for Chain-complete Lattices in the Effective Topos
Abstract In the effective topos there exists a chain-complete distributive lattice with a monotone and progressive endomap which does not have a fixed point. Consequently, the Bourbaki-Witt theorem and Tarski's fixed-point theorem for chain-complete ...
2009 / Andrej Bauer -
Action Prefixes: Reified Synchronization Paths in Minimal Component Interaction Automata
Abstract Component Interaction Automata provide a fitting model to capture and analyze the temporal facets of hierarchical-structured component-oriented software systems. However, the rules governing composition, as is typical...
2010 / Markus Lumpe