Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
 
Information Sciences
Elsevier Science Inc.
 
   
 
Options:
 
  1-10 of 66 reviews Date Reviewed 
  Quantitative graph theory
Dehmer M., Emmert-Streib F., Shi Y. Information Sciences 418(C): 575-580, 2017.  Type: Article

In this paper, the authors provide a description of quantitative graph theory, which is a relatively new branch of graph theory. The key feature of this branch is its measurement approach to quantifying the structural information of ne...

Mar 14 2019
  An indoor navigation system for visually impaired and elderly people based on Radio Frequency Identification (RFID)
Tsirmpas C., Rompas A., Fokou O., Koutsouris D. Information Sciences 320(C): 288-305, 2015.  Type: Article

Assisting elderly and/or visually impaired people in locating and navigating in an indoor environment is a very commendable aim. It motivated Tsirmpas et al. to tackle the issue. The main challenge of indoor navigation is that GPS, whi...

Jan 22 2016
  Automatic kernel clustering with bee colony optimization algorithm
Kuo R., Huang Y., Lin C., Wu Y., Zulvia F. Information Sciences 283107-122, 2014.  Type: Article

Clustering is an unsupervised classification approach extensively used in data mining and pattern recognition. Many clustering techniques have been developed so far. The value of each algorithm depends on the particular problem where i...

Apr 8 2015
  Efficient and robust large medical image retrieval in mobile cloud computing environment
Zhuang Y., Jiang N., Wu Z., Li Q., Chiu D., Hu H. Information Sciences 26360-86, 2014.  Type: Article

Zhuang et al. outline an innovative approach for retrieving and viewing medical image data within a hospital environment. The old server-based medical storage architecture is replaced by what can be interpreted as a cloud-based archite...

Nov 17 2014
   A unified method for finding impossible differentials of block cipher structures
Luo Y., Lai X., Wu Z., Gong G. Information Sciences 263211-220, 2014.  Type: Article

Impossible differential analysis is widely used as a cryptographic tool for key recovering or distinguishing attacks on block ciphers. There are mainly two methods for searching impossible differentials: one is case-by-case analysis an...

Nov 6 2014
  Partial order reduction for checking soundness of time workflow nets
Boucheneb H., Barkaoui K. Information Sciences 282261-276, 2014.  Type: Article

The authors wish to verify workflows designed using timed workflow nets, which Ling and Schmidt proposed in 2000 [1]. Boucheneb, the first author listed, and Rakkay proposed an abstraction technique of contracted state class graphs in ...

Oct 30 2014
  Semantic security against web application attacks
Razzaq A., Latif K., Ahmad H., Hur A., Anwar Z., Bloodsworth P. Information Sciences 25419-38, 2014.  Type: Article

Security concerns are progressively increasing with the unstoppable penetration of technology in everyday life, as the world becomes ever more interconnected. Hackers, attracted by lucrative targets, perform more and more sophisticated...

Sep 19 2014
  Towards UCI+: a mindful repository design
Macià N., Bernadó-Mansilla E. Information Sciences 261237-262, 2014.  Type: Article

The evaluation of machine learning algorithms has always been controversial. What datasets, experimental setting, and statistical tests must be chosen? Dataset repositories such as UCI have been enormously handy for machine learning re...

Sep 12 2014
  Architecture and protocol for intercloud communication
Lloret J., Garcia M., Tomas J., Rodrigues J. Information Sciences 258434-451, 2014.  Type: Article

Cloud computing is a very timely and important topic, and there is current debate on whether it should be centralized or decentralized. The authors try to focus on providing an architecture to bridge the gap between decentralized cloud...

Aug 25 2014
  Planning of business process execution in business process management environments
Bae H., Lee S., Moon I. Information Sciences 268357-369, 2014.  Type: Article

There is no reason why we shouldn’t translate what we might know from one domain (manufacturing optimization) into another (business process modeling), if there are parallels and similarities between the two. The manufacturi...

Jun 16 2014
 
 
 
Display per column
 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy