Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

13,101 Full-Text Articles 16,537 Authors 4,117,996 Downloads 198 Institutions

All Articles in Computer Engineering

Faceted Search

13,101 full-text articles. Page 434 of 447.

Contributors’ Preference In Open Source Software Usability: An Empirical Study, Arif Raza, Luiz Fernando Capretz 2010 The University of Western Ontario

Contributors’ Preference In Open Source Software Usability: An Empirical Study, Arif Raza, Luiz Fernando Capretz

Electrical and Computer Engineering Publications

The fact that the number of users of open source software (OSS) is practically un-limited and that ultimately the software quality is determined by end user’s experience, makes the usability an even more critical quality attribute than it is for proprietary software. With the sharp increase in use of open source projects by both individuals and organizations, the level of usability and related issues must be addressed more seriously. The research model of this empirical investigation studies and establishes the relationship between the key usability factors from contributors’ perspective and OSS usability. A data set of 78 OSS contributors ...


Bi-Planar Postural Stability Model: Fitting Parameters To Patient Data Automatically, Andrew Michael Sovol 2010 Marquette University

Bi-Planar Postural Stability Model: Fitting Parameters To Patient Data Automatically, Andrew Michael Sovol

Master's Theses (2009 -)

Studies of children with cerebral palsy (CP) have shown that maintaining control of posture in quiet standing is often difficult. Physical therapy and assistive devices, both with or without surgery, may be employed in an effort to improve postural stability. Assessing the effectiveness of such interventions is important for healthcare providers and their patients. A previously created bi-planar model of posture control has been further developed as a method of assessment. This MATLAB and Simulink model has successfully replicated experimental results for typical adults and children, as well as children with CP across three different test conditions: eyes open, eyes ...


Network Neutrality Or Internet Innovation?, Christopher S. Yoo 2010 University of Pennsylvania Law School

Network Neutrality Or Internet Innovation?, Christopher S. Yoo

Faculty Scholarship at Penn Law

Over the past two decades, the Internet has undergone an extensive re-ordering of its topology that has resulted in increased variation in the price and quality of its services. Innovations such as private peering, multihoming, secondary peering, server farms, and content delivery networks have caused the Internet’s traditionally hierarchical architecture to be replaced by one that is more heterogeneous. Relatedly, network providers have begun to employ an increasingly varied array of business arrangements and pricing. This variation has been interpreted by some as network providers attempting to promote their self interest at the expense of the public. In fact ...


Towards Improved Trapezoidal Approximation To Intersection (Fusion) Of Trapezoidal Fuzzy Numbers: Specific Procedure And General Non-Associativity Theorem, Gang Xiang, Vladik Kreinovich 2010 University of Texas at El Paso

Towards Improved Trapezoidal Approximation To Intersection (Fusion) Of Trapezoidal Fuzzy Numbers: Specific Procedure And General Non-Associativity Theorem, Gang Xiang, Vladik Kreinovich

Departmental Technical Reports (CS)

In some cases, our uncertainty about a quantity can be described by an interval of its possible values. If we have two or more pieces of interval information about the same quantity, then we can conclude that the actual value belongs to the intersection of these intervals.

In general, we may need a fuzzy number to represent our partial knowledge. A fuzzy number can be viewed as a collection of intervals (alpha-cuts) corresponding to different degrees alpha from [0,1]. In practice, we can only store finitely many alpha-cuts. Usually, we only store the lower and upper alpha-cuts (corresponding to ...


Towards A Natural Proof Of Metrization Theorem For Space-Times, Vladik Kreinovich, Olga Kosheleva 2010 University of Texas at El Paso

Towards A Natural Proof Of Metrization Theorem For Space-Times, Vladik Kreinovich, Olga Kosheleva

Departmental Technical Reports (CS)

In the early 1920s, Pavel Urysohn proved his famous lemma (sometimes referred to as "first non-trivial result of point set topology"). Among other applications, this lemma was instrumental in proving that under reasonable conditions, every topological space can be metrized.

A few years before that, in 1919, a complex mathematical theory was experimentally proven to be extremely useful in the description of real world phenomena: namely, during a solar eclipse, General Relativity theory -- that uses pseudo-Riemann spaces to describe space-time -- has been (spectacularly) experimentally confirmed. Motivated by this success, Urysohn started working on an extension of his lemma and of ...


Integrating Perception And Problem Solving To Predict Complex Object Behaviors, Damian M. Lyons, Sirhan Chaudhry, Marius Agica, John Vincent Monaco 2010 Fordham University

Integrating Perception And Problem Solving To Predict Complex Object Behaviors, Damian M. Lyons, Sirhan Chaudhry, Marius Agica, John Vincent Monaco

Faculty Publications

One of the objectives of Cognitive Robotics is to construct robot systems that can be directed to achieve realworld goals by high-level directions rather than complex, low-level robot programming. Such a system must have the ability to represent, problem-solve and learn about its environment as well as communicate with other agents. In previous work, we have proposed ADAPT, a Cognitive Architecture that views perception as top-down and goaloriented and part of the problem solving process.

Our approach is linked to a SOAR-based problem-solving and learning framework. In this paper, we present an architecture for the perceptive and world modelling components ...


Pretty Lights, Nicholas (Nick) delMas, Matthew (Matt) Maniaci 2010 California Polytechnic State University - San Luis Obispo

Pretty Lights, Nicholas (Nick) Delmas, Matthew (Matt) Maniaci

Computer Engineering

Digital media players often include a visualization component that allows a user to watch a visualization synchronized to their music or videos. This project uses the visualization plugin API of an existing media playback program (WinAmp) but it displays its visuals using physical LED lights. Instead of outputting visuals to the computer screen, data is sent over USB to a micro controller that runs the LED lights. This project aims to give users a more visceral visual experience than traditional visualizations on the computer screen.


Access Control Contracts For Java Program Modules, Carlos E. Rubio-Medrano, Yoonsik Cheon 2010 University of Texas at El Paso

Access Control Contracts For Java Program Modules, Carlos E. Rubio-Medrano, Yoonsik Cheon

Departmental Technical Reports (CS)

Application-level security has become an issue in recent years; for example, errors, discrepancies and omissions in the specification of access control constraints of security-sensitive software components are recognized as an important source for security vulnerabilities. We propose to formally specify access control assumptions or constraints of a program module and enforce them at run-time. We call such specifications access control contracts. To realize access control contracts, we extended the JML language, a formal interface specification language for Java, and developed a prototype support tool that translates access control contracts to runtime checks. The access control contract reduces the vulnerability that ...


Why Polynomial Formulas In Soft Computing, Decision Making, Etc.?, Olga Kosheleva, Martine Ceberio, Vladik Kreinovich 2010 University of Texas at El Paso

Why Polynomial Formulas In Soft Computing, Decision Making, Etc.?, Olga Kosheleva, Martine Ceberio, Vladik Kreinovich

Departmental Technical Reports (CS)

We show that in many application areas including soft constraints reasonable requirements of scale-invariance lead to polynomial formulas for combining degrees (of certainty, of preference, etc.)


Processor Allocator For Chip Multiprocessors, Dawid Maksymilian Zydek 2010 University of Nevada Las Vegas

Processor Allocator For Chip Multiprocessors, Dawid Maksymilian Zydek

UNLV Theses, Dissertations, Professional Papers, and Capstones

Chip MultiProcessor (CMP) architectures consisting of many cores connected through Network-on-Chip (NoC) are becoming main computing platforms for research and computer centers, and in the future for commercial solutions. In order to effectively use CMPs, operating system is an important factor and it should support a multiuser environment in which many parallel jobs are executed simultaneously. It is done by the processor management system of the operating system, which consists of two components: Job Scheduler (JS) and Processor Allocator (PA). The JS is responsible for job scheduling that deals with selection of the next job to be executed, while the ...


A Secure On-Line Credit Card Transaction Method Based On Kerberos Authentication Protocol, Jung Eun Kim 2010 University of Nevada Las Vegas

A Secure On-Line Credit Card Transaction Method Based On Kerberos Authentication Protocol, Jung Eun Kim

UNLV Theses, Dissertations, Professional Papers, and Capstones

Nowadays, electronic payment system is an essential part of modern business. Credit cards or debit cards have been widely used for on-site or remote transactions, greatly reducing the need for inconvenient cash transactions. However, there have been a huge number of incidents of credit card frauds over the Internet due to the security weakness of electronic payment system. A number of solutions have been proposed in the past to prevent this problem, but most of them were inconvenient and did not satisfy the needs of cardholders and merchants at the same time.

In this thesis, we present a new secure ...


Providing Location Security In Vehicular Ad Hoc Networks, Gongjun Yan 2010 Old Dominion University

Providing Location Security In Vehicular Ad Hoc Networks, Gongjun Yan

Computer Science Theses & Dissertations

Location is fundamental information in Vehicular Ad-hoc Networks (VANETs). Almost all VANET applications rely on location information. Therefore it is of importance to ensure location information integrity, meaning that location information is original (from the generator), correct (not bogus or fabricated) and unmodified (value not changed). We present validation mechanisms to provide location integrity for VANETs. In the initial mechanism, we assume that all vehicles are equipped with a radar, a GPS receiver, and a transceiver. Since radar has a limited radar range and transceiver has a limited transmission range, we build network cells as a security unit as well ...


Continuous Spatial Assignment Of Moving Users, Hou U LEONG, Kyriakos MOURATIDIS, Nikos MAMOULIS 2010 University of Hong Kong

Continuous Spatial Assignment Of Moving Users, Hou U Leong, Kyriakos Mouratidis, Nikos Mamoulis

Research Collection School Of Information Systems

Consider a set of servers and a set of users, where each server has a coverage region (i.e., an area of service) and a capacity (i.e., a maximum number of users it can serve). Our task is to assign every user to one server subject to the coverage and capacity constraints. To offer the highest quality of service, we wish to minimize the average distance between users and their assigned server. This is an instance of a well-studied problem in operations research, termed optimal assignment. Even though there exist several solutions for the static case (where user locations ...


Managing Media Rich Geo-Spatial Annotations For A Map-Based Mobile Application Using Clustering, Khasfariyati RAZIKIN, Dion Hoe-Lian GOH, Ee Peng LIM, Aixin SUN, Yin-Leng THENG, Thi Nhu Quynh KIM, Kalyani CHATTERJEA, Chew-Hung CHANG 2010 Nanyang Technological University

Managing Media Rich Geo-Spatial Annotations For A Map-Based Mobile Application Using Clustering, Khasfariyati Razikin, Dion Hoe-Lian Goh, Ee Peng Lim, Aixin Sun, Yin-Leng Theng, Thi Nhu Quynh Kim, Kalyani Chatterjea, Chew-Hung Chang

Research Collection School Of Information Systems

With the prevalence of mobile devices that are equipped with wireless Internet capabilities and Global Positioning System (GPS) functionality, the creation and access of user-generated content are extended to users on the go. Such content are tied to real world objects, in the form of geospatial annotations, and it is only natural that these annotations are visualized using a map-based approach. However, viewing maps that are filled with annotations could hinder the serendipitous discovery of data, especially on the small screens of mobile devices. This calls for a need to manage the annotations. In this paper, we introduce a mobile ...


Forecast For The Future: Emerging Legal Technologies, Carol A. Watson 2010 University of Georgia School of Law Library

Forecast For The Future: Emerging Legal Technologies, Carol A. Watson

Continuing Legal Education Presentations

Begins by discussing technologies that are currently available on the web that can reduce office overhead. Also highlights current general technology trends and still-developing technologies. Concludes with a list of frivolous gadgets to provide food for thought about the coming prospects of technology.


Dsfs: Decentralized Security For Large Parallel File Systems, Zhongying Niu, Hong Jiang, Ke Zhou, Dan Feng, Tianming Yang, Dongliang Lei, Anli Chen 2010 Huazhong University of Science and Technology

Dsfs: Decentralized Security For Large Parallel File Systems, Zhongying Niu, Hong Jiang, Ke Zhou, Dan Feng, Tianming Yang, Dongliang Lei, Anli Chen

CSE Technical reports

This paper describes DSFS, a decentralized security system for large parallel file system. DSFS stores global access control lists (ACLs) in a centralized decisionmaking server and pushes pre-authorization lists (PALs) into storage devices. Thus DSFS allows users to flexibly set any access control policy for the global ACL or even change the global ACL system without having to upgrade the security code in their storage devices. With pre-authorization lists, DSFS enables a networkattached storage device to immediately authorize I/O, instead of demanding a client to acquire an authorization from a centralized authorization server at a crucial time. The client ...


A Novel Eight Switches Inverter Topology For Plug-In Hybrid Electric Vehicle, Omar Hegazy, Joeri Van Mierlo 2010 Vrije Universiteit Brussel (VUB), Belgium

A Novel Eight Switches Inverter Topology For Plug-In Hybrid Electric Vehicle, Omar Hegazy, Joeri Van Mierlo

Dr. Eng. Omar Hegazy

In this paper, a novel inverter topology, Eight Switches Inverter (ESI), is proposed for HEV, especially PHEV system to reduce the number of switches, and to achieve high performance during discharging mode, braking mode and charging mode from grid. Thereby, this topology gives the ability to connect the vehicle with grid at home or at work to charge the Energy Storage System (ESS) easily, especially the battery unit. In addition, the cost and the volume of the power electronics unit (PEU) have reduced. In this research, there are two control strategies have tested to validate the performance of the proposed ...


Adaptive Robot Deployment Algorithms, Jerome LE NY, George J. Pappas 2010 University of Pennsylvania

Adaptive Robot Deployment Algorithms, Jerome Le Ny, George J. Pappas

Technical Reports (ESE)

In robot deployment problems, the fundamental issue is to optimize a steady state performance measure that depends on the spatial configuration of a group of robots. For static deployment problems, a classical way of designing high- level feedback motion planners is to implement a gradient descent scheme on a suitably chosen objective function. This can lead to computationally expensive deployment algorithms that may not be adaptive to uncertain dynamic environments. We address this challenge by showing that algorithms for a variety of deployment scenarios in stochastic environments and with noisy sensor measurements can be designed as stochastic gradient descent algorithms ...


Rwanda National Customer Satisfaction Survey: Results And Conclusions, Deogratias Harorimana 2010 The University of the South Pacific

Rwanda National Customer Satisfaction Survey: Results And Conclusions, Deogratias Harorimana

Dr Deogratias Harorimana

It can be said that development practice requires more than financial and manpower inputs. Rwanda, in 1994 suffered a Genocide. The Society,collectively and under the leadership of His Excellence Paul Kagame the current elected President of Rwanda came together and designed strategies that would propel Rwanda to a Middle-Income, Private Sector Led Economy by the Year 2020.

In 2009, a client seating in one of the Hotels in a Suburb of Remera, in Kigali City, complained about poor service delivery he was experiencing from the waitress staff.Using his Blackberry message, the client forwarded an email to some of ...


Developing An Effective And Efficient Real Time Strategy Agent For Use As A Computer Generated Force, Kurt Weissgerber 2010 Air Force Institute of Technology

Developing An Effective And Efficient Real Time Strategy Agent For Use As A Computer Generated Force, Kurt Weissgerber

Theses and Dissertations

Computer Generated Forces (CGF) are used to represent units or individuals in military training and constructive simulation. The use of CGF significantly reduces the time and money required for effective training. For CGF to be effective, they must behave as a human would in the same environment. Real Time Strategy (RTS) games place players in control of a large force whose goal is to defeat the opponent. The military setting of RTS games makes them an excellent platform for the development and testing of CGF. While there has been significant research in RTS agent development, most of the developed agents ...


Digital Commons powered by bepress