Computer and information sciences topic list of research papers
-
Towards Understanding the Cynicism of Social Networking Sites: An Operations Management Perspective
Abstract With the advent of Internet and high diffusion of mobile phones, Social Networking Sites (SNS) have become the new source of entertainment, information and business support system. Easy accessibility of SNS through various devices is one of ...
2015 / Dhanya Jothimani, Abhay Kumar Bhadani, Ravi Shankar -
Online/Offline Blind Signature
Abstract The processing ablity and response speed of the wireless communication terminals are limited, common signatures become the bottleneck to the development of the wireless networks. For that problem, based on the characteristics of the blind...
2012 / Jiang Hua, Hu Ran-dong -
Using PMU signals from dominant paths in power system wide-area damping control
Abstract This article presents a comprehensive study of dominant inter-area oscillation path signals and their application for power system wide-area damping control (WADC). The analysis, carried out on both small and large study systems, focuses on ...
2015 / Yuwa Chompoobutrgool, Luigi Vanfretti -
A logical structure based fault tolerant approach to handle leader election in mobile ad hoc networks
Abstract We propose a light weight layered architecture to support the computation of leader in mobile ad hoc networks. In distributed applications, the leader has to perform a number of synchronization activities among participating nodes and...
2015 / Bharti Sharma, Ravinder Singh Bhatia, Awadhesh Kumar Singh -
Relating Semantic Models for the Object Calculus
Abstract Abadi and Cardelli have investigated several versions of the ç-calculus, a calculus for describing central features of object-oriented programs, with particular emphasis on various type systems. In this paper we study the properties of a...
2005 / Luca Aceto, Hans Hüttel, Anna Ingólfsdóttir, Josva Kleist -
A survey of identifier–locator split addressing architectures
Abstract The TCP/IP architecture of the Internet was originally designed around the contemporary restrictions of large computers that were difficult to move around. However, electronics followed Moore’s law, resulting in cheaper and smaller...
2015 / Miika Komu, Mohit Sethi, Nicklas Beijar -
Secure Data Sharing and Processing in Heterogeneous Clouds
Abstract The extensive cloud adoption among the European Public Sector Players empowered them to own and operate a range of cloud infrastructures. These deployments vary both in the size and capabilities, as well as in the range of employed...
2015 / Bojan Suzic, Andreas Reiter, Florian Reimair, Daniele Venturi, Baldur Kubo -
A Mobile Ad-hoc Network multi-path routing protocol based on biological attractor selection for disaster recovery communication
Abstract The performance of traditional routing protocols for mesh networks can decrease significantly in disaster recovery situations due to dynamic changes to the network environment. A number of multi-path routing protocols have been proposed to...
2015 / Hyukjoon Lee, Donghoon Jeon -
A Program and Project Management Approach for Collaborative University-industry R&D Funded Contracts
Abstract This paper presents a new program and project management (PPM) approach especially devoted to support collaborative university-industry R&D funded contracts. While the literature provides some advice on how to embark on designing such...
2015 / Gabriela Fernandes, Eduardo B. Pinto, Ricardo J. Machado, Madalena Araújo, António Pontes -
A constructive algorithm for unsupervised learning with incremental neural network
Abstract Artificial neural network (ANN) has wide applications such as data processing and classification. However, comparing with other classification methods, ANN needs enormous memory space and training time to build the model. This makes ANN...
2015 / Jenq-Haur Wang, Hsin-Yang Wang, Yen-Lin Chen, Chuan-Ming Liu -
Power efficient and high performance VLSI architecture for AES algorithm
Abstract Advanced encryption standard (AES) algorithm has been widely deployed in cryptographic applications. This work proposes a low power and high throughput implementation of AES algorithm using key expansion approach. We minimize the power...
2015 / K. Kalaiselvi, H. Mangalam -
New Approach to Introduction of 3D Digital Technologies in Design Education
Abstract In addition to traditional methods in product development, the increasing availability of two new 3D digital technologies, namely digital manufacturing (3D-printing) and digitizing of surfaces (3D-scanning), offer new opportunities in...
2015 / Stefan Junk, Rebecca Matt -
Big Data Parallelism: Issues in different X-Information Paradigms
Abstract Emerging technologies are largely engaged in processing big data using different computational environments especially in different X-information systems such as Astronomy, Biology, Biomedicine, Business, Chemistry, Climate, Computer...
2015 / Koushik Mondal -
Theoretical and experimental analysis of genetic algorithms based MPPT for PV systems
Abstract This paper presents a theoretical and experimental analysis of Maximum Power Point Tracking (MPPT) method for photovoltaic (PV) systems based on Genetic Algorithms (GAs). The proposed algorithm is based on Genetic Algorithms (GAs) and it...
2015 / Slimane Hadji, Jean-Paul Gaubert, Fateh Krim -
Robust Detection of Malicious Nodes in Mobile Sensor Networks Using Software Attestation2013 / Jun-Won Ho
-
Face Recognition using R-KDA with Non-Linear SVM for Multi-View Database
Abstract This paper develops a new Face Recognition System which combines R-KDA for selecting optimal discriminant features with non-linear SVM for Recognition. Experiment results have been conducted showing the comparison of enhanced efficiency of...
2015 / Hidangmayum Saxena Devi, Romesh Laishram, Dalton Meitei Thounaojam -
Integration of Object Oriented Host Program with Network DBMS
Abstract Several mapping techniques are in use for the storage of objects in Network Database Management System (NDBMS). Though there is a generation gap between the evolution of NDBMS and Object Oriented Technology (OOT), both are either analogous...
2015 / Shivanand M. Handigund, Siddappa G. Makanur, M. Sreenivasa Rao -
A Key Perspective on Specialized Lexis: Keywords in Telecommunication Engineering for CLIL
Abstract The advent of bilingual programs to tertiary education has meant a noticeable change and introduced Content and Language Integrated Learning (CLIL) approach into Spanish universities. Learning specific contents through the medium of English ...
2015 / Camino Rea Rizzo, María José Marín Pérez -
Basic Ideas for Transformations of Specification Architectures1 1This work has been achieved during maternity leave and has been strongly supported by my family.
Abstract This contribution gives the formal foundation for specification architectures. Specification architectures are given by diagrams in an arbitrary category of specifications. Hence this is in line with the extension form graph transformations ...
2004 / Julia Padberg -
RUASN: A Robust User Authentication Framework for Wireless Sensor Networks2011 / Pardeep Kumar, Amlan Jyoti Choudhury, Mangal Sain, Sang-Gon Lee, Hoon-Jae Lee