Browsing 08 Information and Computing Sciences by Title

DSpace/Manakin Repository

Search OPUS


Advanced Search

Browse

My Account

Browsing 08 Information and Computing Sciences by Title

Sort by: Order: Results:

  • Tung, TT; Jamalipour, A (IEEE, 2005-01)
    The paper summarizes the development of a genetic-based rate control algorithm. The aspect of rate control design focused on is specifically for implementation on the link/network layers. In this respect, the underlying ...
  • Agbinya, JI (IEEE Computer Society 2005, 2005-01)
    Optimum theorems for combining QoS metrics to reduce computation time in nodes (routers) is proposed based on fundamental theorems on QoS metrics. The proposed theorems unify selection of metrics and provide the methods ...
  • Li, S; Liu, W; Wang, S (2013)
    Dealing with spatial and temporal knowledge is an indispensable part of almost all aspects of human activity. The qualitative approach to spatial and temporal reasoning, known as Qualitative Spatial and Temporal Reasoning ...
  • Li, S; Nebel, B (Oxford University Press, 2007-01)
    The ability to reason in space is crucial for agents in order to make informed decisions. Current high-level qualitative approaches to spatial reasoning have serious deficiencies in not reflecting the hierarchical nature ...
  • Al-Ani, Ban (CSREA Press (CD Rom), 2002)
  • Zhang, W; Lin, X; Cheema, MA; Zhang, Y; Wang, W (IEEE, 2010-01)
    K Nearest Neighbor search has many applications including data mining, multi-media, image processing, and monitoring moving objects. In this paper, we study the problem of KNN over multi-valued objects. We aim to provide ...
  • Abreu, FBE; Henderson-Sellers, B; Piattini, M; Poels, G; Sahraoui, HA (SPRINGER-VERLAG BERLIN, 2002-01-01)
  • Bernardo, DV; Chua, B; Hoang, DB (Research Publishing Services, 2009-01)
    This paper introduces a novel approach to a more practical Quantitative SRA. The approach formalized in this paper is based on the methods described in various risk assessment frameworks that were described by existing ...
  • Ying, M (Elsevier Science Bv, 2010-01)
    The main purpose of this paper is to examine some (potential) applications of quantum computation in AI and to review the interplay between quantum theory and AI. For the readers who are not familiar with quantum computation, ...
  • Ying, M; Feng, Y; Yu, N (2013-01-29)
    Quantum cryptography has been extensively studied in the last twenty years, but information-flow security of quantum computing and communication systems has been almost untouched in the previous research. Duo to the essential ...
  • Sun, Zhiwei; Du, Rg; Long, Dong-Yang (World Scientific Publ Co Pte Ltd, 2013)
    Recently, quantum key distribution (QKD) with classical Bob has been suggested and proven completely robust by Boyer et al. [Phys. Rev. Lett.99 (2007) 140501] in which quantum Alice has a fully-fledged quantum power, while ...
  • Ying, M (Elsevier, 2007-01)
    An axiomatization of a mathematical theory consists of a system of basic notions as well as a set of axioms about these notions. The mathematical theory is then the set of theorems which can be derived from the axioms. ...
  • Ying, M; Feng, Y (2006-05-26)
    Loop is a powerful program construct in classical computation, but its power is still not exploited fully in quantum computation. The exploitation of such power definitely requires a deep understanding of the mechanism of ...
  • Ying, M; Feng, Y; Duan, R; Li, Y; Yu, N (Science Press, 2012-01)
    This paper surveys the new field of programming methodology and techniques for future quantum computers, including design of sequential and concurrent quantum programming languages, their semantics and implementations. ...
  • Wilde, MM; Datta, N; Hsieh, MH; Winter, A (2012-12-21)
    We extend quantum rate distortion theory by considering auxiliary resources that might be available to a sender and receiver performing lossy quantum data compression. The first setting we consider is that of quantum rate ...
  • Datta, N; Hsieh, MH; Wilde, MM (2011-08-25)
    We derive quantum counterparts of two key theorems of classical information theory, namely, the rate distortion theorem and the source-channel separation theorem. The rate-distortion theorem gives the ultimate limits on ...
  • Liu, X; Li, J; Wang, L (Springer, 2008-01)
    Protein-protein interactions (PPIs) are one of the most important mechanisms in cellular processes. To model protein interaction sites, recent studies have suggested to find interacting protein group pairs from large PPI ...
  • Shen, J; Tao, D; Li, X (IEEE-Inst Electrical Electronics Engineers Inc, 2009-01)
    In this paper, we introduce a novel indexing scheme-QUery Context tree (QUC-tree) to facilitate efficient query sensitive music search under different query contexts. Distinguished from the previous approaches, QUC-tree ...
  • Li, Y; Geng, B; Yang, L; Xu, C; Bian, W (Elsevier Science Bv, 2012-01)
    Query difficulty estimation predicts the performance of the search result of the given query. It is a powerful tool for multimedia retrieval and receives increasing attention. It can guide the pseudo relevance feedback to ...
  • Yang, C; Liu, C; Zhang, X; Nepal, S; Chen, J (2013)
    Nowadays, we enter a new era of data explosion which introduces the new problems for big data processing. Current methods for querying streaming XML big data are mostly based on events filtering techniques. It is well known ...