# Browsing ISCIM 2013 by Issue Date

Sort by: Order: Results:

• (2013-12-19)
The stratified tree, also called van Emde Boas tree, is a data structure implementing the full repertoire of instructions manipulating a single subset $A$of a finite ordered Universe $U = [0 ... u-1]$. Instructions include ...
• (2013-12-19)
In many scientific Clouds, storing very large amounts of application data remains a great challenge. To provide necessary storage and performance support, one strategy is to distribute data over multiple disks using RAID ...
• (2013-12-19)
Malware is a specific type of software intended to breed damages ranging from computer systems fallout to deprivation of data integrity and confidentiality. Recently, along with the high usage of distributed systems and ...
• (2013-12-19)
Cluster analysis is an important tool in the exploration of large collections of data, revealing patterns and significant correlations in the data. The fuzzy approach to the clustering problem enhances the modeling capability ...
• (2013-12-19)
Poverty is a now days case in the developing country, especially in Albania. It is important to define which is the criteria that distinguish poor from non poor and usually is necessary a description of the poverty phenomenon ...
• (2013-12-19)
The concept of inner product lays an important role in functional analysis and in its applications. Starting from its axiomatic, many researches have made various modifications passing in its generalization, such as ...
• (2013-12-19)
Iris based identification systems are considered among the most promising recognition systems due to the inner characteristics of the iris, such as uniqueness, stability and time invariance. This paper proposes a new texture ...
• (2013-12-19)
It is a very common problem to align signals upon time-axis for analysis of datasets obtained from biological experiments. Since biological or chemical signals may be measured differently due to some factors such as ...
• (2013-12-19)
Acquisition and analysis of data from sensor networks, where nodes operate in unsupervised way, has become a ubiquitous issue. The biggest challenge in this process is related to limited energy, computational and memory ...
• (2013-12-19)
Digital watermarking involves embedding a watermark value within a digital object, such as image, audio, video, text and software, to prove authenticity in case of intellectual property infringement. Headed to this direction, ...
• (2013-12-19)
In this study, an implementation of an education programme was designed by using Virtual Reality technology. This education system includes primary school course contents and uses Video Capture Virtual Reality technique. ...
• (2013-12-19)
Combinatorial Artificial Bee Colony Algorithm (CABC) is a new version of Artificial Bee Colony (ABC) to solve combinatorial type optimization problems and quick Artificial Bee Colony (qABC) algorithm is an improved version ...
• (2013-12-19)
Difficulties faced by students while trying to penetrate into the labor market and challenges faced by university career offices when helping students build successful professional careers demand the building of mediums ...
• (2013-12-19)
This article describes a method used to calculate the similarity between short English texts, specifically of sentence length. The described algorithm calculates semantic and word order similarities of two sentences. In ...
• (2013-12-19)
The computation of dominators is a central tool in program optimization and code generation, and it has applications in other diverse areas includingconstraint programming, circuit testing, and biology. In this paper we ...
• (2013-12-19)
The focus of the research study is set on analyzes of the reliability of software application, aiming to determine the ways of measurement and determine the parameters of a reliable software application through the case ...
• (2013-12-19)
Two basic sources of errors are associated to the use of bootstrap methods: one is derived from the fact that the true distribution is substituted by a suitable estimate, and the other is simulation errors. Some techniques ...
• (2013-12-19)
The most natural question of reliable computation, in every computation model and noise model,is whether given a certain level of noise, a machine of that model exists that canperform arbitrarily complex computations under ...
• (2013-12-19)
The real-time web is a set of technologies and practices that enable users to receive information as soon as it is published by its authors, rather than requiring that they or their software check a source periodically for ...
• (2013-12-19)
In this paper we give some results on gamma-near-fields through a new definition. We prove that a $\Gamma$-near-field is B-simple and for every $\alpha$ exists an element that is $\alpha$-distributive and for every \$0 \neq ...