Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Automatic classification (1)
- Automatic indexing (1)
- Client/server computing; Cloud computing; Information retrieval; Virtual storage (Computer science) (1)
- Clustering; Computer networks; Distributed algorithms; Group membership; Network partitioning; Self-stabilizing algorithm (1)
- Communicating sequential processes (CSP); Human user interface design; Occam (Computer program language); Process oriented design; Software engineering; User interfaces (Computer systems); Visual programming (Computer science) (1)
-
- Computer networks (1)
- Computer networks; Electronic data processing — Distributed processing (1)
- Credit card fraud (1)
- Credit cards (1)
- Cryptography (1)
- Data transmission systems (1)
- Debit cards (1)
- Digital communications (1)
- Dual Iterative Pattern Relation Extraction (DIPRE); Machine Learning; Pattern Extraction; Pattern recognition systems; Search engines — Programming (1)
- Electronic indexes – Design (1)
- Electronic payments (1)
- Human-computer interaction (1)
- Identity theft (1)
- Information Retrieval (1)
- Information visualization (1)
- Internet security (1)
- Kerberos cryptographic framework (1)
- Machine learning (1)
- No Number Credit Card (NNCC) (1)
- Online payments (1)
- Payment system (1)
- Secure on-line credit card transactions (1)
- Security (1)
- Text processing (Computer science) (1)
Articles 1 - 10 of 10
Full-Text Articles in Entire DC Network
Pattern Extraction From The World Wide Web, Praveena Mettu
Pattern Extraction From The World Wide Web, Praveena Mettu
UNLV Theses, Dissertations, Professional Papers, and Capstones
The World Wide Web is a source of huge amount of unlabeled information spread across different sources in varied formats. This presents us with both opportunities and challenges in leveraging such large amount of unstructured data to build knowledge bases and to extract relevant information.
As part of this thesis, a semi-supervised logistic regression model called “Dual Iterative Pattern Relation Extraction” proposed by Sergey Brin is selected for further investigation. DIPRE presents a technique which exploits the duality between sets of patterns and relations to grow the target relation starting from a small sample.
This project built in JAVA using …
Dynamic Indexing, Viswada Sripathi
Dynamic Indexing, Viswada Sripathi
UNLV Theses, Dissertations, Professional Papers, and Capstones
In this thesis, we report on index constructions for large document collections to facilitate the task of search and retrieval. We first report on classical static index construction methods and their shortcomings. We then report on dynamic index construction techniques and their effectiveness.
Dynamic Distributed Programming And Applications To Swap Edge Problem, Feven Z. Andemeskel
Dynamic Distributed Programming And Applications To Swap Edge Problem, Feven Z. Andemeskel
UNLV Theses, Dissertations, Professional Papers, and Capstones
Link failure is a common reason for disruption in communication networks. If communication between processes of a weighted distributed network is maintained by a spanning tree T, and if one edge e of T fails, communication can be restored by finding a new spanning tree, T’. If the network is 2-edge connected, T’ can always be constructed by replacing e by a single edge, e’, of the network. We refer to e’ as a swap edge of e.
The best swap edge problem is to find the best choice of e’, that is, that e which causes the new spanning …
Self-Stabilizing Leader Election In Dynamic Networks, Hema Piniganti
Self-Stabilizing Leader Election In Dynamic Networks, Hema Piniganti
UNLV Theses, Dissertations, Professional Papers, and Capstones
The leader election problem is one of the fundamental problems in distributed computing. It has applications in almost every domain. In dynamic networks, topology is expected to change frequently. An algorithm A is self-stabilizing if, starting from a completely arbitrary configuration, the network will eventually reach a legitimate configuration.
Note that any self-stabilizing algorithm for the leader election problem is also an algorithm for the dynamic leader election problem, since when the topology of the network changes, we can consider that the algorithm is starting over again from an arbitrary state. There are a number of such algorithms in the …
Self-Stabilizing Group Membership Protocol, Mahesh Subedi
Self-Stabilizing Group Membership Protocol, Mahesh Subedi
UNLV Theses, Dissertations, Professional Papers, and Capstones
In this thesis, we consider the problem of partitioning a network into groups of bounded diameter.
Given a network of processes X and a constant D, the group partition problem is the problem of finding a D-partition of X, that is, a partition of X into disjoint connected subgraphs, which we call groups, each of diameter no greater than D. The minimal group partition problem is to find a D-partition {G1, ... Gm} of X such that no two groups can be combined; that is, for any Gi and Gj, where i ≠ j, either Gi U Gj is disconnected …
Visual Occam: High Level Visualization And Design Of Process Networks, Mikolaj M. Slomka
Visual Occam: High Level Visualization And Design Of Process Networks, Mikolaj M. Slomka
UNLV Theses, Dissertations, Professional Papers, and Capstones
With networks, multiprocessors, and multi-threaded systems becoming more common in our world it is increasingly evident that concurrent programming is not something to be ignored or marginalized even though many takes on concurrency (mainly by means of monitors or shared resources) have proven to be difficult to deal with on large scales. Thankfully, a good deal of work has already been done to combat this, through CSP, occam, and other such derivatives, to produce a scalable process oriented paradigm. Still, it is cumbersome to attempt to deal with the intricacies of such communicating networks down to every minutia; if, instead, …
Cloud Storage And Online Bin Packing, Swathi Venigella
Cloud Storage And Online Bin Packing, Swathi Venigella
UNLV Theses, Dissertations, Professional Papers, and Capstones
Cloud storage is the service provided by some corporations (such as Mozy and Carbonite) to store and backup computer files. We study the problem of allocating memory of servers in a data center based on online requests for storage. Over-the-net data backup has become increasingly easy and cheap due to cloud storage. Given an online sequence of storage requests and a cost associated with serving the request by allocating space on a certain server one seeks to select the minimum number of servers as to minimize total cost. We use two different algorithms and propose a third algorithm; we show …
A Comparative Study On Text Categorization, Aditya Chainulu Karamcheti
A Comparative Study On Text Categorization, Aditya Chainulu Karamcheti
UNLV Theses, Dissertations, Professional Papers, and Capstones
Automated text categorization is a supervised learning task, defined as assigning category labels to new documents based on likelihood suggested by a training set of labeled documents. Two examples of methodology for text categorizations are Naive Bayes and K-Nearest Neighbor.
In this thesis, we implement two categorization engines based on Naive Bayes and K-Nearest Neighbor methodology. We then compare the effectiveness of these two engines by calculating standard precision and recall for a collection of documents. We will further report on time efficiency of these two engines.
A Visualization Approach For Message Passing In Parallel Computing Systems, Arunkumar Sadasivan
A Visualization Approach For Message Passing In Parallel Computing Systems, Arunkumar Sadasivan
UNLV Theses, Dissertations, Professional Papers, and Capstones
Information Visualization has been used as an effective method in transforming textual information into a visual form that enables users to effectively communicate and understand the information. MPI (Message Passing Interface) usually involves a large amount of data, which necessitates exploring innovative ideas to visualize such data effectively.
In this thesis, we implement a graph visualization tool called MPROV to effectively visualize communication patterns of message passing using log files from MPI applications. The tool provides several interaction techniques to effectively reduce the amount of data displayed on the screen. We have also developed protocol conformance checking, which verifies the …
A Secure On-Line Credit Card Transaction Method Based On Kerberos Authentication Protocol, Jung Eun Kim
A Secure On-Line Credit Card Transaction Method Based On Kerberos Authentication Protocol, Jung Eun Kim
UNLV Theses, Dissertations, Professional Papers, and Capstones
Nowadays, electronic payment system is an essential part of modern business. Credit cards or debit cards have been widely used for on-site or remote transactions, greatly reducing the need for inconvenient cash transactions. However, there have been a huge number of incidents of credit card frauds over the Internet due to the security weakness of electronic payment system. A number of solutions have been proposed in the past to prevent this problem, but most of them were inconvenient and did not satisfy the needs of cardholders and merchants at the same time.
In this thesis, we present a new secure …