Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 31

Full-Text Articles in Entire DC Network

Learning Successful Strategies In Repeated General-Sum Games, Jacob W. Crandall Dec 2005

Learning Successful Strategies In Repeated General-Sum Games, Jacob W. Crandall

Theses and Dissertations

Many environments in which an agent can use reinforcement learning techniques to learn profitable strategies are affected by other learning agents. These situations can be modeled as general-sum games. When playing repeated general-sum games with other learning agents, the goal of a self-interested learning agent is to maximize its own payoffs over time. Traditional reinforcement learning algorithms learn myopic strategies in these games. As a result, they learn strategies that produce undesirable results in many games. In this dissertation, we develop and analyze algorithms that learn non-myopic strategies when playing many important infinitely repeated general-sum games. We show that, in …


Trust Broker: A Defense Against Identity Theft From Online Transactions, Michael George Edvalson Dec 2005

Trust Broker: A Defense Against Identity Theft From Online Transactions, Michael George Edvalson

Theses and Dissertations

The proliferation of online services over the years has encouraged more and more people to participate in Internet activities. Many web sites request personal and sensitive information needed to deliver the desired service. Unfortunately, it is difficult to distinguish the sites that can be trusted to protect such information from those that cannot. Many attempts to make the Internet easier to use introduce new security and privacy problems. On the other hand, most attempts at creating a safe online environment produce systems that are cryptic and hard to use. The TrustBroker system is based on a specialized online repository that …


Industrial Technology Education Teachers Perceptions Of National Standards For Technological Literacy In The State Of Arizona, Allan R. Mcrae Dec 2005

Industrial Technology Education Teachers Perceptions Of National Standards For Technological Literacy In The State Of Arizona, Allan R. Mcrae

Theses and Dissertations

Today, it is becoming increasingly clear that there is a growing interest, concern, and need for technological literacy. To this end, the International Technology Education Association (ITEA) through the Technology for All Americans Project, has developed and promulgated the Standards for Technological Literacy: Content for the Study of Technology. This effort is part of the ongoing initiative to develop technology standards on a national level, and to focus on what every student in grades K-12 should know and be able to do in order to achieve technological literacy (ITEA, 2000). The purpose of this study was to investigate the perceived …


Generating Data-Extraction Ontologies By Example, Yuanqiu Zhou Nov 2005

Generating Data-Extraction Ontologies By Example, Yuanqiu Zhou

Theses and Dissertations

Ontology-based data-extraction is a resilient web data-extraction approach. A major limitation of this approach is that ontology experts must manually develop and maintain data-extraction ontologies. The limitation prevents ordinary users who have little knowledge of conceptual models from making use of this resilient approach. In this thesis we have designed and implemented a general framework, OntoByE, to generate data-extraction ontologies semi-automatically through a small set of examples collected by users. With the assistance of a limited amount of prior knowledge, experimental evidence shows that OntoByE is capable of interacting with users to generate data-extraction ontologies for domains of interest to …


A Software Development Environment For Building Context-Aware Systems For Family Technology, Jeremiah Kenton Jones Nov 2005

A Software Development Environment For Building Context-Aware Systems For Family Technology, Jeremiah Kenton Jones

Theses and Dissertations

The purpose of this thesis was to utilize existing technologies to create a development environment suitable for creating context-aware applications and systems specific to home and family living conditions. After outlining the history of context-aware applications and the challenges that face family-centric systems in this field, a development environment was implemented that solves the unique challenges that face application development for family-centric, context-aware applications. In particular, research cited in this document indicates that a browser-based user interface is the most appropriate interface for a family environment. The flexibility of the interface, as well as the familiarity of the application structure …


Generating Medical Logic Modules For Clinical Trial Eligibility, Craig G. Parker Nov 2005

Generating Medical Logic Modules For Clinical Trial Eligibility, Craig G. Parker

Theses and Dissertations

Clinical trials are important to the advancement of medical science. They provide the experimental and statistical basis needed to determine the benefit of diagnostic and therapeutic agents and procedures. The more patients enrolled in a clinical trial, the more confidence we can have in the trial's results. However, current practices for identifying eligible patients can be expensive and time-consuming. To assist in making identification of eligible patients more cost effective, we have developed a system for translating the eligibility criteria for clinical trials to an executable form. This system takes as input the eligibility criteria for a trial formatted as …


Real-Time Motion Transition By Example, Cameron Quinn Egbert Nov 2005

Real-Time Motion Transition By Example, Cameron Quinn Egbert

Theses and Dissertations

Motion transitioning is a common task in real-time applications such as games. While most character motions can be created a priori using motion capture or hand animation, transitions between these motions must be created by an animation system at runtime. Because of this requirement, it is often difficult to create a transition that preserves the feel that the actor or animator has put into the motion. An additional difficulty is that transitions must be created in real-time. This paper provides a method of creating motion transitions that is both computationally feasible for interactive speeds, and preserves the feel of the …


Verification Of Digital Controller Verifications, Xuan Wang Nov 2005

Verification Of Digital Controller Verifications, Xuan Wang

Theses and Dissertations

This thesis presents an analysis framework to verify the stablility property of a closed-loop control system with a software controller implementation. The usual approach to verifying stability for software uses experiments which are costly and can be dangerous. More recently, mathematical models of software have been proposed which can be used to reason about the correctness of controllers. However, these mathematical models ignore computational details that may be important in verification. We propose a method to determine the instability of a closed-loop system with a software controller implementation under l^2 inputs using simulation. This method avoids the cost of experimentation …


Rate-Adaptive Runlength Limited Encoding For High-Speed Infrared Communication, James Cyril Funk Sep 2005

Rate-Adaptive Runlength Limited Encoding For High-Speed Infrared Communication, James Cyril Funk

Theses and Dissertations

My thesis will demonstrate that Rate Adaptive Runlength Limited encoding (RA-RLL) achieves high data rates with acceptable error rate over a wide range of signal distortion/attenuation, and background noise. RA-RLL has performance superior to other infrared modulation schemes in terms of bandwidth efficiency, duty cycle control, and synchronization frequency. Rate adaptive techniques allow for quick convergence of RA-RLL parameters to acceptable values. RA-RLL may be feasibly implemented on systems with non-ideal timing and digital synchronization.


Importance Resampling For Global Illumination, Justin F. Talbot Sep 2005

Importance Resampling For Global Illumination, Justin F. Talbot

Theses and Dissertations

This thesis develops a generalized form of Monte Carlo integration called Resampled Importance Sampling. It is based on the importance resampling sample generation technique. Resampled Importance Sampling can lead to significant variance reduction over standard Monte Carlo integration for common rendering problems. We show how to select the importance resampling parameters for near optimal variance reduction. We also combine RIS with stratification and with Multiple Importance Sampling for further variance reduction. We demonstrate the robustness of this technique on the direct lighting problem and achieve up to a 33% variance reduction over standard techniques. We also suggest using RIS as …


On-Disk Sequence Cache (Odsc): Using Excess Disk Capacity To Increase Performance, Christopher Ryan Slade Sep 2005

On-Disk Sequence Cache (Odsc): Using Excess Disk Capacity To Increase Performance, Christopher Ryan Slade

Theses and Dissertations

We present an on-disk sequence cache (ODSC), which improves disk drive performance. An ODSC uses a separate disk partition to store disk data in the order that the operating system requests it. Storing data in this order reduces the amount of seeking that the disk drive must do. As a result, the average disk access time is reduced. Reducing the disk access time improves the performance of the system, especially when booting the operating system, loading applications, and when main memory is limited. Experiments show that our ODSC speeds up application loads by as much as 413%. Our ODSC also …


Challenging Policies That Do Not Play Fair: A Credential Relevancy Framework Using Trust Negotiation Ontologies, Travis S. Leithead Aug 2005

Challenging Policies That Do Not Play Fair: A Credential Relevancy Framework Using Trust Negotiation Ontologies, Travis S. Leithead

Theses and Dissertations

This thesis challenges the assumption that policies will "play fair" within trust negotiation. Policies that do not "play fair" contain requirements for authentication that are misleading, irrelevant, and/or incorrect, based on the current transaction context. To detect these unfair policies, trust negotiation ontologies provide the context to determine the relevancy of a given credential set for a particular negotiation. We propose a credential relevancy framework for use in trust negotiation that utilizes ontologies to process the set of all available credentials C and produce a subset of credentials C' relevant to the context of a given negotiation. This credential relevancy …


Dynamic Dead Variable Analysis, Micah S. Lewis Aug 2005

Dynamic Dead Variable Analysis, Micah S. Lewis

Theses and Dissertations

Dynamic dead variable analysis (DDVA) extends traditional static dead variable analysis (SDVA) in the context of model checking through the use of run-time information. The analysis is run multiple times during the course of model checking to create a more precise set of dead variables. The DDVA is evaluated based on the amount of memory used to complete model checking relative to SDVA while considering the extra overhead required to implement DDVA. On several models with a complex control flow graph, DDVA reduces the amount of memory needed by 38-88MB compared to SDVA with a cost of 36 bytes of …


Detecting Similar Html Documents Using A Sentence-Based Copy Detection Approach, Rajiv Yerra Jul 2005

Detecting Similar Html Documents Using A Sentence-Based Copy Detection Approach, Rajiv Yerra

Theses and Dissertations

Web documents that are either partially or completely duplicated in content are easily found on the Internet these days. Not only these documents create redundant information on the Web, which take longer to filter unique information and cause additional storage space, but also they degrade the efficiency of Web information retrieval. In this thesis, we present a new approach for detecting similar (HTML)Web documents and evaluate its performance. To detect similar documents, we first apply our sentence-based copy detection approach to determine whether sentences in any two documents should be treated as the same or different according to the degrees …


Constraint-Based Interpolation, Daniel David Goggins Jul 2005

Constraint-Based Interpolation, Daniel David Goggins

Theses and Dissertations

Image reconstruction is the process of converting a sampled image into a continuous one prior to transformation and resampling. This reconstruction can be more accurate if two things are known: the process by which the sampled image was obtained and the general characteristics of the original image. We present a new reconstruction algorithm known as Constraint-Based Interpolation, which estimates the sampling functions found in cameras and analyzes properties of real world images in order to produce quality real-world image magnifications. To accomplish this, Constraint-Based Interpolation uses a sensor model that pushes the pixels in an interpolation to more closely match …


Cache Characterization And Performance Studies Using Locality Surfaces, Elizabeth Schreiner Sorenson Jul 2005

Cache Characterization And Performance Studies Using Locality Surfaces, Elizabeth Schreiner Sorenson

Theses and Dissertations

Today's processors commonly use caches to help overcome the disparity between processor and main memory speeds. Due to the principle of locality, most of the processor's requests for data are satisfied by the fast cache memory, resulting in a signficant performance improvement. Methods for evaluating workloads and caches in terms of locality are valuable for cache design. In this dissertation, we present a locality surface which displays both temporal and spatial locality on one three-dimensional graph. We provide a solid, mathematical description of locality data and equations for visualization. We then use the locality surface to examine the locality of …


Establishing Public Confidence In The Viability Of Fingerprint Biometric Technology, Nathan Alan Green Jul 2005

Establishing Public Confidence In The Viability Of Fingerprint Biometric Technology, Nathan Alan Green

Theses and Dissertations

The most common personal authentication techniques used for identity management employ a secret PIN or password that must be remembered. The challenge, for a given user, is that a multitude of such codes must be recalled over the course of the day for transactions involving distinct computer applications. Password mania prevails. Fingerprint biometric technology is an ideal alternate solution to this password recall problem. In spite of their availability for nearly thirty years, fingerprint biometric systems still remain uncommon in public sectors of industry such as education, government, and technology. Technology has improved sufficiently that false acceptance and rejection rates …


Accelerated Ray Traced Animations Exploiting Temporal Coherence, Darwin Tarry Baines Jul 2005

Accelerated Ray Traced Animations Exploiting Temporal Coherence, Darwin Tarry Baines

Theses and Dissertations

Ray tracing is a well-know technique for producing realistic graphics. However, the time necessary to generate images is unacceptably long. When producing the many frames that are necessary for animations, the time is magnified. Many methods have been proposed to reduce the calculations necessary in ray tracing. Much of the effort has attempted to reduce the number of rays cast or to reduce the number of intersection calculations. Both of these techniques exploit spatial coherence. These acceleration techniques are expanded not only to exploit spatial coherence but also to exploit temporal coherence in order to reduce calculations by treating animation …


Suitability Of The Nist Shop Data Model As A Neutral File Format For Simulation, Gregory Brent Harward Jul 2005

Suitability Of The Nist Shop Data Model As A Neutral File Format For Simulation, Gregory Brent Harward

Theses and Dissertations

Due to the successful application in internet related fields, Extensible Markup Language (XML) and its related technologies are being explored as a revolutionary software file format technology used to provide increased interoperability in the discrete-event simulation (DES) arena. The National Institute of Standards and Technology (NIST) has developed an XML-based information model (XSD) called the Shop Data Model (SDM), which is used to describe the contents of a neutral file format (NFF) that is being promoted as a means to make manufacturing simulation technology more accessible to a larger group of potential customers. Using a two step process, this thesis …


Task Localization, Similarity, And Transfer; Towards A Reinforcement Learning Task Library System, James Lamond Carroll Jul 2005

Task Localization, Similarity, And Transfer; Towards A Reinforcement Learning Task Library System, James Lamond Carroll

Theses and Dissertations

This thesis develops methods of task localization, task similarity discovery, and task transfer for eventual use in a reinforcement learning task library system, which can effectively “learn to learn,” improving its performance as it encounters various tasks over the lifetime of the learning system.


Phishing Warden: Enhancing Content-Triggered Trust Negotiation To Prevent Phishing Attacks, James Presley Henshaw Jun 2005

Phishing Warden: Enhancing Content-Triggered Trust Negotiation To Prevent Phishing Attacks, James Presley Henshaw

Theses and Dissertations

Phishing attacks are spam e-mails that attempt to fool recipients into divulging their identifying information by posing as a message from a well known company and using that company's branding and logos. It is estimated that phishing attacks have cost bank and credit card customers $1.2 billion in the U.S. in 2003. Previous work, content-triggered trust negotiation (CTTN), filters Internet traffic for sensitive data, and prevents a user from disclosing sensitive information to an un-trusted server. However, existing CTTN implementations are vulnerable to client-side scripts that obfuscate any data the client's browser sends to the web server in order to …


Improving And Extending Behavioral Animation Through Machine Learning, Jonathan J. Dinerstein Apr 2005

Improving And Extending Behavioral Animation Through Machine Learning, Jonathan J. Dinerstein

Theses and Dissertations

Behavioral animation has become popular for creating virtual characters that are autonomous agents and thus self-animating. This is useful for lessening the workload of human animators, populating virtual environments with interactive agents, etc. Unfortunately, current behavioral animation techniques suffer from three key problems: (1) deliberative behavioral models (i.e., cognitive models) are slow to execute; (2) interactive virtual characters cannot adapt online due to interaction with a human user; (3) programming of behavioral models is a difficult and time-intensive process. This dissertation presents a collection of papers that seek to overcome each of these problems. Specifically, these issues are alleviated …


Interactive Image Filling-In, Teryl Lynne Arnold Apr 2005

Interactive Image Filling-In, Teryl Lynne Arnold

Theses and Dissertations

Removing unwanted scratches or objects from an image in an undetectable manner is a technique that has been researched for its many useful and varied applications, such as removing scratches, defects, super-imposed text, or even entire objects from a scene. Currently there is a wide variety of algorithms that fill in unwanted regions, none of which incorporate user preferences into the structure completion process. By building a framework to incorporate user preferences into the filling-in process, user input can be utilized to more effectively fill in damaged regions in an image. User input can influence the filling-in process in a …


T-Spline Merging, Heather Ipson Apr 2005

T-Spline Merging, Heather Ipson

Theses and Dissertations

Geometric models, such as for use in CAD/CAM or animation, are often constructed in a piece-wise fashion. Historically, these models have been made of NURBS surfaces. For various reasons it is problematic and often times mathematically impossible to combine several NURBS models into one continuous surface. The recent invention of a surface type called T-splines has made the combining of NURBS surfaces into a single continuous surface possible, but much of the mathematics has yet to be explored. This thesis explores the mathematics and algorithms necessary to merge multiple NURBS, T-spline, or T-NURCC surfaces into a single continuous surface. This …


January: Search Based On Social Insect Behavior, Peter C. Lamborn Apr 2005

January: Search Based On Social Insect Behavior, Peter C. Lamborn

Theses and Dissertations

January is a group of interacting stateless model checkers. Each agent functions on a processor located on a super computer or a network of workstations (NOW). The agent's search pattern is a semi-random walk based on the behavior of the grey field slug (Agriolimax reticulatus), the house fly (Musca domestica), and the black ant (Lassius niger). The agents communicate to lessen the amount of duplicate work being done. Every algorithm has a memory threshold above which they search efficiently. This threshold varies not only by model but also by algorithm. Janaury's threshold is lower than the thresholds of other algorithms …


Improving Routing Security Using A Decentralized Public Key Distribution Algorithm, Jeremy C. Goold Apr 2005

Improving Routing Security Using A Decentralized Public Key Distribution Algorithm, Jeremy C. Goold

Theses and Dissertations

Today's society has developed a reliance on networking infrastructures. Health, financial, and many other institutions deploy mission critical and even life critical applications on local networks and the global Internet. The security of this infrastructure has been called into question over the last decade. In particular, the protocols directing traffic through the network have been found to be vulnerable. One such protocol is the Open Shortest Path First (OSPF) protocol. This thesis proposes a security extension to OSPF containing a decentralized certificate authentication scheme (DecentCA) that eliminates the single point of failure/attack present in current OSPF security extensions. An analysis …


A Statistical Performance Model Of Homogeneous Raidb Clusters, Brandon Lamar Rogers Mar 2005

A Statistical Performance Model Of Homogeneous Raidb Clusters, Brandon Lamar Rogers

Theses and Dissertations

The continual growth of the Internet and e-commerce is driving demand for speed, reliability and processing power. With the rapid development and maturation of e-commerce, the need for a quick access to large amounts of information is steadily rising. Traditionally, database systems have been used for information storage and retrieval. However, with online auctions, rapid Internet searches, and data archival, the need for more powerful database systems is also growing. One type of distributed database is called Redundant Arrays of Inexpensive Databases (RAIDb). RAIDb clusters are middleware-driven to promote interoperability and portability. RAIDb clusters allow for multiple levels of data …


Thor: The Hybrid Online Repository, Timothy W. Van Der Horst Mar 2005

Thor: The Hybrid Online Repository, Timothy W. Van Der Horst

Theses and Dissertations

Digital credentials enable users to perform secure interactions by proving either their identity or that they posses certain attributes. Special care is taken to protect these credentials and their associated private keys during transaction time. However, protection of these items outside of the transaction is often delegated to a secure credential repository. A mobile environment creates significant challenges for secure repositories. We examine these challenges with respect to existing repository practices and produce a set of requirements that a repository must meet in order to cope with the harshness of a mobile environment. We also present the design and implementation …


A Framework For Extraction Plans And Heuristics In An Ontology-Based Data-Extraction System, Alan E. Wessman Jan 2005

A Framework For Extraction Plans And Heuristics In An Ontology-Based Data-Extraction System, Alan E. Wessman

Theses and Dissertations

Extraction of information from semi-structured or unstructured documents, such as Web pages, is a useful yet complex task. Research has demonstrated that ontologies may be used to achieve a high degree of accuracy in data extraction while maintaining resiliency in the face of document changes. Ontologies do not, however, diminish the complexity of a data-extraction system. As research in the field progresses, the need for a modular data-extraction system that de-couples the various functional processes involved continues to grow.

In this thesis we propose a framework for such a system. The nature of the framework allows new algorithms and ideas …


Java Performance Of The Rijndael Encryption Algorithm Across Compilers And Virtual Machines, Gregory Leavitt Orgill Jan 2005

Java Performance Of The Rijndael Encryption Algorithm Across Compilers And Virtual Machines, Gregory Leavitt Orgill

Theses and Dissertations

The Rijndael encryption algorithm has recently been published as the Advanced Encryption Standard (AES), a Federal Information Processing Standard, and is being accepted by developers and designers as the algorithm of choice where encryption is required. Java is becoming the language of choice for E-Business applications, many of which require cryptography. The performance of any Java application is dependent on the compiler and virtual machine used to compile and interpret. Prior research has provided performance information for the Rijndael algorithm in Java for specific virtual machines. This research includes the development of a Rijndael implementation in Java. Using Java system …