Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

13,103 Full-Text Articles 16,561 Authors 4,117,996 Downloads 199 Institutions

All Articles in Computer Engineering

Faceted Search

13,103 full-text articles. Page 446 of 447.

Application Planning, Jochen Albrecht, Clare Davies 2010 CUNY Hunter College

Application Planning, Jochen Albrecht, Clare Davies

Publications and Research

No abstract provided.


Identifying A Computer Forensics Expert: A Study To Measure The Characteristics Of Forensic Computer Examiners, Gregory H. Carlton, Reginald Worthley 2010 California State Polytechnic University

Identifying A Computer Forensics Expert: A Study To Measure The Characteristics Of Forensic Computer Examiners, Gregory H. Carlton, Reginald Worthley

Journal of Digital Forensics, Security and Law

The usage of digital evidence from electronic devices has been rapidly expanding within litigation, and along with this increased usage, the reliance upon forensic computer examiners to acquire, analyze, and report upon this evidence is also rapidly growing. This growing demand for forensic computer examiners raises questions concerning the selection of individuals qualified to perform this work. While courts have mechanisms for qualifying witnesses that provide testimony based on scientific data, such as digital data, the qualifying criteria covers a wide variety of characteristics including, education, experience, training, professional certifications, or other special skills. In this study, we compare task ...


Clustering Spam Domains And Destination Websites: Digital Forensics With Data Mining, Chun Wei, Alan Sprague, Gary Warner, Anthony Skjellum 2010 University of Alabama, Birmingham

Clustering Spam Domains And Destination Websites: Digital Forensics With Data Mining, Chun Wei, Alan Sprague, Gary Warner, Anthony Skjellum

Journal of Digital Forensics, Security and Law

Spam related cyber crimes have become a serious threat to society. Current spam research mainly aims to detect spam more effectively. We believe the identification and disruption of the supporting infrastructure used by spammers is a more effective way of stopping spam than filtering. The termination of spam hosts will greatly reduce the profit a spammer can generate and thwart his ability to send more spam. This research proposes an algorithm for clustering spam domains extracted from spam emails based on the hosting IP addresses and tracing the IP addresses over a period of time. The results show that many ...


Computer Forensics For Graduate Accountants: A Motivational Curriculum Design Approach, Grover S. Kearns 2010 University of South Florida, St. Petersburg

Computer Forensics For Graduate Accountants: A Motivational Curriculum Design Approach, Grover S. Kearns

Journal of Digital Forensics, Security and Law

Computer forensics involves the investigation of digital sources to acquire evidence that can be used in a court of law. It can also be used to identify and respond to threats to hosts and systems. Accountants use computer forensics to investigate computer crime or misuse, theft of trade secrets, theft of or destruction of intellectual property, and fraud. Education of accountants to use forensic tools is a goal of the AICPA (American Institute of Certified Public Accountants). Accounting students, however, may not view information technology as vital to their career paths and need motivation to acquire forensic knowledge and skills ...


Book Review: Digital Forensic Evidence Examination (2nd Ed.), Gary C. Kessler 2010 Gary Kessler Associates

Book Review: Digital Forensic Evidence Examination (2nd Ed.), Gary C. Kessler

Journal of Digital Forensics, Security and Law

On the day that I sat down to start to write this review, the following e-mail came across on one of my lists: Person A and Person B write back and forth and create an email thread. Person A then forwards the email to Person C, but changes some wording in the email exchange between A & B. What is the easiest way (and is it even possible) to find out when that earlier email message was altered before sent to Person C? Before you try to answer these questions, read Fred Cohen's Digital Forensic Evidence Examination. His book won ...


Table Of Contents, 2010 Embry-Riddle Aeronautical University

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


Using Virtual Reality To Enhance Electrical Safety And Design In The Built Environment, Martin Barrett, Jonathan Blackledge, Eugene Coyle 2010 Technological University Dublin

Using Virtual Reality To Enhance Electrical Safety And Design In The Built Environment, Martin Barrett, Jonathan Blackledge, Eugene Coyle

Articles

Electricity and the inherent risks associated with its use in the built environment have long since been a priority for the electrical services industry and also the general public who must live and work in this environment. By its nature virtual reality has the advantage of being safe for both the user and equipment. In addition, it offers the user an opportunity to be exposed to a range of scenarios and conditions that either occur infrequently or are hazardous to replicate. This paper presents a prototype desktop virtual reality model, to enhance electrical safety and design in the built environment ...


On The Applications Of Deterministic Chaos For Encrypting Data On The Cloud, Jonathan Blackledge, Nikolai Ptitsyn 2010 Technological University Dublin

On The Applications Of Deterministic Chaos For Encrypting Data On The Cloud, Jonathan Blackledge, Nikolai Ptitsyn

Conference papers

Cloud computing is expected to grow considerably in the future because it has so many advantages with regard to sale and cost, change management, next generation architectures, choice and agility. However, one of the principal concerns for users of the Cloud is lack of control and above all, data security. This paper considers an approach to encrypting information before it is ‘place’ on the Cloud where each user has access to their own encryption algorithm, an algorithm that is based on a set of Iterative Function Systems that outputs a chaotic number stream, designed to produce a cryptographically secure cipher ...


Information Theoretic Approach For Assessing Image Fidelity In Photon-Counting Arrays, Srikanth R. Narravula, Majeed M. Hayat, Bahram Javidi 2010 University of New Mexico

Information Theoretic Approach For Assessing Image Fidelity In Photon-Counting Arrays, Srikanth R. Narravula, Majeed M. Hayat, Bahram Javidi

Electrical and Computer Engineering Faculty Research and Publications

The method of photon-counting integral imaging has been introduced recently for three-dimensional object sensing, visualization, recognition and classification of scenes under photon-starved conditions. This paper presents an information-theoretic model for the photon-counting imaging (PCI) method, thereby providing a rigorous foundation for the merits of PCI in terms of image fidelity. This, in turn, can facilitate our understanding of the demonstrated success of photon-counting integral imaging in compressive imaging and classification. The mutual information between the source and photon-counted images is derived in a Markov random field setting and normalized by the source-image’s entropy, yielding a fidelity metric that is ...


An Empirical Evaluation Of The Effectiveness Of Jml Assertions As Test Oracles, Kavir Shrestha 2010 University of Denver

An Empirical Evaluation Of The Effectiveness Of Jml Assertions As Test Oracles, Kavir Shrestha

Electronic Theses and Dissertations

Test oracles remain one of the least understood aspects of the modern testing process. An oracle is a mechanism used by software testers and software engineers for determining whether a test has passed or failed. One widely-supported approach to oracles is the use of runtime assertion checking during the testing activity. Method invariants,pre- and postconditions help detect bugs during runtime. While assertions are supported by virtually all programming environments, are used widely in practice, and are often assumed to be effective as test oracles, there are few empirical studies of their efficacy in this role. In this thesis, we ...


Expressiveness Of Streaming String Transducers, Rajeev Alur 2010 University of Pennsylvania

Expressiveness Of Streaming String Transducers, Rajeev Alur

Departmental Papers (CIS)

Streaming string transducers define (partial) functions from input strings to output strings. A streaming string transducer makes a single pass through the input string and uses a finite set of variables that range over strings from the output alphabet. At every step, the transducer processes an input symbol, and updates all the variables in parallel using assignments whose right-hand-sides are concatenations of output symbols and variables with the restriction that a variable can be used at most once in a right-hand-side expression. It has been shown that streaming string transducers operating on strings over infinite data domains are of interest ...


Permission To Speak: A Logic For Access Control And Conformance, Nikhil Dinesh, Aravind Joshi, Insup Lee, Oleg Sokolsky 2010 University of Pennsylvania

Permission To Speak: A Logic For Access Control And Conformance, Nikhil Dinesh, Aravind Joshi, Insup Lee, Oleg Sokolsky

Departmental Papers (CIS)

Formal languages for policy have been developed for access control and conformance checking. In this paper, we describe a formalism that combines features that have been developed for each application. From access control, we adopt the use of a saying operator. From conformance checking, we adopt the use of operators for obligation and permission. The operators are combined using an axiom that permits a principal to speak on behalf of another. The combination yields benefits to both applications. For access control, we overcome the problematic interaction between hand-off and classical reasoning. For conformance, we obtain a characterization of legal power ...


Innovations In The Internet’S Architecture That Challenge The Status Quo, Christopher S. Yoo 2010 University of Pennsylvania Law School

Innovations In The Internet’S Architecture That Challenge The Status Quo, Christopher S. Yoo

Faculty Scholarship at Penn Law

The current debate over broadband policy has largely overlooked a number of changes to the architecture of the Internet that have caused the price paid by and quality of service received by traffic traveling across the Internet to vary widely. Topological innovations, such as private peering, multihoming, secondary peering, server farms, and content delivery networks, have caused the Internet’s traditionally hierarchical architecture to be replaced by one that is more heterogeneous. Moreover, network providers have begun to employ an increasingly varied array of business arrangements. Some of these innovations are responses to the growing importance of peer-to-peer technologies. Others ...


When Discrete Meets Differential: Assessing The Stability Of Structure From Small Motion, Wen-yan LIN, Geok-Choo TAN, Loong-Fah CHEONG 2010 Singapore Management University

When Discrete Meets Differential: Assessing The Stability Of Structure From Small Motion, Wen-Yan Lin, Geok-Choo Tan, Loong-Fah Cheong

Research Collection School Of Information Systems

We provide a theoretical proof showing that under a proportional noise model, the discrete eight point algorithm behaves similarly to the differential eight point algorithm when the motion is small. This implies that the discrete algorithm can handle arbitrarily small motion for a general scene, as long as the noise decreases proportionally with the amount of image motion and the proportionality constant is small enough. This stability result extends to all normalized variants of the eight point algorithm. Using simulations, we show that given arbitrarily small motions and proportional noise regime, the normalized eight point algorithms outperform their differential counterparts ...


Measurement And Modeling Of Infrared Nonlinear Absorption Coefficients And Laser-Induced Damage Thresholds In Ge And Gasb, T. J. Wagner, M. A. Bohn, Ronald A. Coutu Jr., L. P. Gonzalez, J. M. Murray, K. L. Schepler, S. Guha 2010 Air Force Institute of Technology

Measurement And Modeling Of Infrared Nonlinear Absorption Coefficients And Laser-Induced Damage Thresholds In Ge And Gasb, T. J. Wagner, M. A. Bohn, Ronald A. Coutu Jr., L. P. Gonzalez, J. M. Murray, K. L. Schepler, S. Guha

Electrical and Computer Engineering Faculty Research and Publications

Using a simultaneous fitting technique to extract nonlinear absorption coefficients from data at two pulse widths, we measure two-photon and free-carrier absorption coefficients for Ge and GaSb at 2.05 and 2.5 μm for the first time, to our knowledge. Results agreed well with published theory. Single-shot damage thresholds were also measured at 2.5 μm and agreed well with modeled thresholds using experimentally determined parameters including nonlinear absorption coefficients and temperature dependent linear absorption. The damage threshold for a single-layer Al2O3 anti-reflective coating on Ge was 55% or 35% lower than the uncoated threshold for ...


Transmitter Optimization In Multiuser Wireless Systems With Quality Of Service Constraints, Danda B. Rawat 2010 Old Dominion University

Transmitter Optimization In Multiuser Wireless Systems With Quality Of Service Constraints, Danda B. Rawat

Electrical & Computer Engineering Theses & Disssertations

In this dissertation, transmitter adaptation for optimal resource allocation in wireless communication systems are investigated. First, a multiple access channel model is considered where many transmitters communicate with a single receiver. This scenario is a basic component of a. wireless network in which multiple users simultaneously access the resources of a wireless service provider. Adaptive algorithms for transmitter optimization to meet Quality-of-Service (QoS) requirements in a distributed manner are studied. Second, an interference channel model is considered where multiple interfering transmitter-receiver pairs co-exist such that a given transmitter communicates with its intended receiver in the presence of interference from other ...


Adaptive Resource Allocation For Cognitive Wireless Ad Hoc Networks, Behdis Eslamnour 2010 Missouri University of Science and Technology

Adaptive Resource Allocation For Cognitive Wireless Ad Hoc Networks, Behdis Eslamnour

Doctoral Dissertations

"Widespread use of resource constrained wireless ad hoc networks requires careful management of the network resources in order to maximize the utilization. In cognitive wireless networks, resources such as spectrum, energy, communication links/paths, time, space, modulation scheme, have to be managed to maintain quality of service (QoS). Therefore in the first paper, a distributed dynamic channel allocation scheme is proposed for multi-channel wireless ad hoc networks with single-radio nodes. The proposed learning scheme adapts the probabilities of selecting each channel as a function of the error in the performance index at each step.

Due to frequent changes in topology ...


Adaptive User Interface For Vehicle Swarm Control, Paul Robinette 2010 Missouri University of Science and Technology

Adaptive User Interface For Vehicle Swarm Control, Paul Robinette

Masters Theses

"An algorithm to automatically generate behaviors for robotic vehicles has been created and tested in a laboratory setting. This system is designed to be applied in situations where a large number of robotic vehicles must be controlled by a single operator. The system learns what behaviors the operator typically issues and offers these behaviors to the operator in future missions. This algorithm uses the symbolic clustering method Gram-ART to generate these behaviors. Gram-ART has been shown to be successful at clustering such standard symbolic problems as the mushroom dataset and the Unix commands dataset. The algorithm was tested by having ...


Efficient Modular Arithmetic Units For Low Power Cryptographic Applications, Rajashekhar Reddy Modugu 2010 Missouri University of Science and Technology

Efficient Modular Arithmetic Units For Low Power Cryptographic Applications, Rajashekhar Reddy Modugu

Masters Theses

"The demand for high security in energy constrained devices such as mobiles and PDAs is growing rapidly. This leads to the need for efficient design of cryptographic algorithms which offer data integrity, authentication, non-repudiation and confidentiality of the encrypted data and communication channels. The public key cryptography is an ideal choice for data integrity, authentication and non-repudiation whereas the private key cryptography ensures the confidentiality of the data transmitted. The latter has an extremely high encryption speed but it has certain limitations which make it unsuitable for use in certain applications. Numerous public key cryptographic algorithms are available in the ...


Fpga Implementation Of Pso Algorithm And Neural Networks, Parviz Palangpour 2010 Missouri University of Science and Technology

Fpga Implementation Of Pso Algorithm And Neural Networks, Parviz Palangpour

Masters Theses

"This thesis describes the Field Programmable Gate Array (FPGA) implementations of two powerful techniques of Computational Intelligence (CI), the Particle Swarm Optimization algorithm (PSO) and the Neural Network (NN). Particle Swarm Optimization (PSO) is a popular population-based optimization algorithm. While PSO has been shown to perform well in a large variety of problems, PSO is typically implemented in software. Population-based optimization algorithms such as PSO are well suited for execution in parallel stages. This allows PSO to be implemented directly in hardware and achieve much faster execution times than possible in software. In this thesis, a pipelined architecture for hardware ...


Digital Commons powered by bepress