Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

Theses/Dissertations

2004

Institution
Keyword
Publication

Articles 1 - 30 of 247

Full-Text Articles in Entire DC Network

Coordinating Heterogeneous Web Services Through Handhelds Using Syd?S Wrapper Framework, Mohini Padhye Dec 2004

Coordinating Heterogeneous Web Services Through Handhelds Using Syd?S Wrapper Framework, Mohini Padhye

Computer Science Theses

Tying web services together to build large, distributed, collaborative applications has gathered noticeable momentum and a lot of research is being put in it. Along with composition of the web services, coordination is one key aspect that has been considered keenly. Many frameworks, languages and protocols have been proposed for web service composition and coordination. With the advancement in wireless technology and rapid deployment of mobile services, collaborative application development for small devices using such composed web services finds a new research area. Much less work has been done in the area of web service coordination for mobile environment. In …


Requirement Elicitation Of Large Web Projects., David E. Frazier Dec 2004

Requirement Elicitation Of Large Web Projects., David E. Frazier

Electronic Theses and Dissertations

One of the most important aspects of developing a large Web-based project is getting the correct requirements from the client. Time and money can be lost if the requirements are incomplete or inaccurate. Traditional Web design sources tend to gloss over this important activity.

Software engineering is a mature field that can help in the quest for more complete and accurate requirement gathering. This paper explores the ways that traditional software engineering techniques can be applied to Web projects. A methodology is presented based on both existing and new techniques. Several experiments are conducted to determine the usefulness of each …


Com- Putational Subset Model Selection Algorithms And Applications, Xinli Bao Dec 2004

Com- Putational Subset Model Selection Algorithms And Applications, Xinli Bao

Doctoral Dissertations

This dissertation develops new computationally e±cient algorithms for identifying the subset of variables that minimizes any desired information criteria in model selection.

In recent years, the statistical literature has placed more and more empha- sis on information theoretic model selection criteria. A model selection crite- rion chooses model that \closely" approximates the true underlying model. Recent years have also seen many exciting developments in the model se- lection techniques. As demand increases for data mining of massive data sets with many variables, the demand for model selection techniques are be- coming much stronger and needed. To this end, we introduce …


Generating Linear Orders Of Events For Geospatial Domains, Suzannah Hall Dec 2004

Generating Linear Orders Of Events For Geospatial Domains, Suzannah Hall

Electronic Theses and Dissertations

Events in the world do not occur in neat chronological order, but may take place, for example, during or overlapping each other, or as simultaneous events. Efficient summaries of real-world events are important in many disciplines and require events to be modeled in a linear fashion. This thesis focuses on modeling events as intervals and using relations between the events to derive linear orders from more complex partially ordered sets. A method is developed for mapping Allen's thirteen temporal relations to only two relations, before and equals, which allow a linear ordering of all events present in the set. This …


Annotation Manager: An Automated Web-Based Content Management System For Digital Libraries With Annotated Bibliographies, Frenny Thomas Dec 2004

Annotation Manager: An Automated Web-Based Content Management System For Digital Libraries With Annotated Bibliographies, Frenny Thomas

Theses and Dissertations

With the expansion of the World Wide Web in the 90s, individuals (especially students) are always on a quest for information resources especially in the form of Web sites. Yet many of them are overwhelmed when faced with deciding which site will best suit their research needs. As a result, these individuals may select a resource for less than optimal reasons. To ease some of the burden, libraries have made great advances to provide a place to organize information resources. Such places are called library portals, and they typically provide a gateway to web resources by categorizing and annotating them …


Statistical Tools For Digital Image Forensics, Alin C. Popescu Dec 2004

Statistical Tools For Digital Image Forensics, Alin C. Popescu

Dartmouth College Ph.D Dissertations

A digitally altered image, often leaving no visual clues of having been tampered with, can be indistinguishable from an authentic image. The tampering, however, may disturb some underlying statistical properties of the image. Under this assumption, we propose five techniques that quantify and detect statistical perturbations found in different forms of tampered images: (1) re-sampled images (e.g., scaled or rotated); (2) manipulated color filter array interpolated images; (3) double JPEG compressed images; (4) images with duplicated regions; and (5) images with inconsistent noise patterns. These techniques work in the absence of any embedded watermarks or signatures. For each technique we …


Crown Reductions And Decompositions: Theoretical Results And Practical Methods, William Henry Suters, Iii Dec 2004

Crown Reductions And Decompositions: Theoretical Results And Practical Methods, William Henry Suters, Iii

Masters Theses

Two kernelization schemes for the vertex cover problem, an NP-hard problem in graph theory, are compared. The first, crown reduction, is based on the identification of a graph structure called a crown and is relatively new while the second, LP-kernelization has been used for some time. A proof of the crown reduction algorithm is presented, the algorithm is implemented and theorems are proven concerning its performance. Experiments are conducted comparing the performance of crown reduction and LP- kernelization on real world biological graphs. Next, theorems are presented that provide a logical connection between the crown structure and LP-kernelization. Finally, an …


Using Linear Features For Aerial Image Sequence Mosaiking, Caixia Wang Dec 2004

Using Linear Features For Aerial Image Sequence Mosaiking, Caixia Wang

Electronic Theses and Dissertations

With recent advances in sensor technology and digital image processing techniques, automatic image mosaicking has received increased attention in a variety of geospatial applications, ranging from panorama generation and video surveillance to image based rendering. The geometric transformation used to link images in a mosaic is the subject of image orientation, a fundamental photogrammetric task that represents a major research area in digital image analysis. It involves the determination of the parameters that express the location and pose of a camera at the time it captured an image. In aerial applications the typical parameters comprise two translations (along the x …


Forensic Analysis Of Digital Image Tampering, Jonathan R. Sturak Dec 2004

Forensic Analysis Of Digital Image Tampering, Jonathan R. Sturak

Theses and Dissertations

The use of digital photography has increased over the past few years, a trend which opens the door for new and creative ways to forge images. The manipulation of images through forgery influences the perception an observer has of the depicted scene, potentially resulting in ill consequences if created with malicious intentions. This poses a need to verify the authenticity of images originating from unknown sources in absence of any prior digital watermarking or authentication technique. This research explores the holes left by existing research; specifically, the ability to detect image forgeries created using multiple image sources and specialized methods …


Context-Specific Preference Learning Of One Dimensional Quantitative Geospatial Attributes Using A Neuro-Fuzzy Approach, Georgios Mountrakis Dec 2004

Context-Specific Preference Learning Of One Dimensional Quantitative Geospatial Attributes Using A Neuro-Fuzzy Approach, Georgios Mountrakis

Electronic Theses and Dissertations

Change detection is a topic of great importance for modern geospatial information systems. Digital aerial imagery provides an excellent medium to capture geospatial information. Rapidly evolving environments, and the availability of increasing amounts of diverse, multiresolutional imagery bring forward the need for frequent updates of these datasets. Analysis and query of spatial data using potentially outdated data may yield results that are sometimes invalid. Due to measurement errors (systematic, random) and incomplete knowledge of information (uncertainty) it is ambiguous if a change in a spatial dataset has really occurred. Therefore we need to develop reliable, fast, and automated procedures that …


A Framework For Downloading Wide-Area Files, Rebecca Lynn Collins Dec 2004

A Framework For Downloading Wide-Area Files, Rebecca Lynn Collins

Masters Theses

The challenge of efficiently retrieving files that are broken into segments and replicated across the widearea is of prime importance to wide-area, peer-to-peer, and Grid file systems. Two different algorithms addressing this challenge have been proposed and evaluated. While both have been successful in different performance scenarios, there has been no unifying work that can view both algorithms under a single framework. In this thesis, we define such a framework, where download algorithms are defined in terms of the four dimensions that the client always controls: the number of simultaneous downloads, the degree of work replication, the failover strategy, and …


On The Use Of Randomness In Computing To Perform Intelligent Tasks, Ryan Scott Regensburger Dec 2004

On The Use Of Randomness In Computing To Perform Intelligent Tasks, Ryan Scott Regensburger

Theses and Dissertations

The study of Artificial Intelligence attempts to simulate the processes of human intelligence in a set of computable algorithms. The purpose of Random Algorithms in this field is to provide a best-guess approach at identifying the unknown. In this thesis, research shows that random algorithms are able to break down many intelligent processes into a set of solvable problems. For example, solving puzzles and playing games involve the same estimating ability shown in standard problems such as the Coupon Collector problem or the Monty Hall problem. This thesis shows Random Algorithmic applications in two overlapping categories of intelligent behavior: Pattern …


Probabilistic Suffix Models For Windows Application Behavior Profiling: Framework And Initial Results, Geoffrey Alan Mazeroff Dec 2004

Probabilistic Suffix Models For Windows Application Behavior Profiling: Framework And Initial Results, Geoffrey Alan Mazeroff

Masters Theses

Developing statistical/structural models of code execution behavior is of considerable practical importance. This thesis describes a framework for employing probabilistic suffix models as a means of constructing behavior profiles from code-traces of Windows XP applications. Emphasis is placed on the inference and use of probabilistic suffix trees and automata with new contributions in the area of auxiliary symbol distributions. An initial real-time classification system is discussed and preliminary results of detecting known benign and viral applications are presented.


Modeling The Spread And Prevention Of Malicious Mobile Code Via Simulation Cs-2004-15, Christopher Brian Shirey Dec 2004

Modeling The Spread And Prevention Of Malicious Mobile Code Via Simulation Cs-2004-15, Christopher Brian Shirey

Theses and Dissertations

Malicious mobile code causes billions of dollars every year in damages, and that cost keeps increasing. Traditional signature-based anti-virus software is a reactive solution that can not detect fast spreading malicious code quickly enough to prevent widespread infection. If we hope to prevent widespread infection of future malicious mobile code, new prevention techniques must be developed that either stop a new infection completely, or at least limit the spread until signature-based anti-virus software can be updated. Simulators exist that model the spread of malicious mobile code, but none currently exists that can efficiently model host-based and network-based spread prevention techniques …


Analysis Of Hostile Network Reconnaissance To Anticipate And Mitigate Network Attacks, Luis Angel Rivera Dec 2004

Analysis Of Hostile Network Reconnaissance To Anticipate And Mitigate Network Attacks, Luis Angel Rivera

Theses and Dissertations

Network security systems today such as current intrusion detection systems, intrusion prevention systems and firewalls are good at reacting to attacks as they occur or shortly after they occur. Current security systems lack the ability to identify and detect the activity that usually precedes an attack. This activity is known as network reconnaissance. In this thesis we have developed a technique that can assist current security systems to detect hostile network reconnaissance to anticipate and mitigate network attacks.


Maximal Clique Enumeration And Related Tools For Microarray Data Analysis, Nicole E. Baldwin Dec 2004

Maximal Clique Enumeration And Related Tools For Microarray Data Analysis, Nicole E. Baldwin

Masters Theses

The purpose of this study was to investigate the utility of exact maximal clique enumeration in DNA microarray analysis, to analyze and improve upon existing exact maximal clique enumeration algorithms, and to develop new clique-based algorithms to assist in the analysis as indicated during the course of the study. As a first test, microarray data sets comprised of pre-classified human lung tissue samples were obtained through the Critical Assessment of Microarray Data Analysis (CAMDA) conference. A combination of exact maximal clique enumeration and approximate dominating set was used to attempt to classify the samples.

In another test, maximal clique enumeration …


Recommender Systems For Multimedia Libraries: An Evaluation Of Different Models For Datamining Usage Data, Raquel Oliveira Araujo Dec 2004

Recommender Systems For Multimedia Libraries: An Evaluation Of Different Models For Datamining Usage Data, Raquel Oliveira Araujo

Computer Science Theses & Dissertations

Many recommender systems exist today to help users deal with the large growth in the amount of information available in the Internet. Most of these recommender systems use collaborative filtering or content-based techniques to present new material that would be of interest to a user. While these methods have proven to be effective, they have not been designed specifically for multimedia collections. In this study we present a new method to find recommendations that is not dependent on traditional Information Retrieval (IR) methods and compare it to algorithms that do rely on traditional IR methods. We evaluated these algorithms using …


Automating The Extraction Of Domain-Specific Information From The Web-A Case Study For The Genealogical Domain, Troy L. Walker Nov 2004

Automating The Extraction Of Domain-Specific Information From The Web-A Case Study For The Genealogical Domain, Troy L. Walker

Theses and Dissertations

Current ways of finding genealogical information within the millions of pages on the Web are inadequate. In an effort to help genealogical researchers find desired information more quickly, we have developed GeneTIQS, a Genealogy Target-based Information Query System. GeneTIQS builds on ontology-based methods of data extraction to allow database-style queries on the Web. This thesis makes two main contributions to GeneTIQS. (1) It builds a framework to do generic ontology-based data extraction. (2) It develops a hybrid record separator based on Vector Space Modeling that uses both formatting clues and data clues to split pages into component records. The record …


Target-Dominant Chinese-English Machine Translation, Dan Su Nov 2004

Target-Dominant Chinese-English Machine Translation, Dan Su

Theses and Dissertations

Information exchange is increasing rapidly with the advent of globalization. As the language spoken by the most people in today's world, Chinese will play an important role in information exchange in the future. Therefore, we need an efficient and practical means to access the increasingly large volume of Chinese data. This thesis describes a target-dominant Chinese-English machine translation system, which can translate a given Chinese news sentence into English. We conjecture that we can improve the state of the art of MT using a TDMT approach. This system has participated in the NIST (National Institute of Standards and Technology) 2004 …


Synthesizing Realistic Spine Motion Using Traditional Rig Controllers, Jabbar Raisani Nov 2004

Synthesizing Realistic Spine Motion Using Traditional Rig Controllers, Jabbar Raisani

Computer Science Honors Theses

This thesis presents a specific method for simulating realistic spine motion through the use of traditional rig control objects. The spine's motion and flexibility is based on a curve as opposed to the more traditional three bone spine. This allows for a more fluid animation more closely resembling that of a spinal column. However, this setup keeps the traditional three control rig setup in order to mimic the control system of a traditional three bone spine. Currently, three bone systems are well understood by animators and the motion is easy to control. The problem with this setup is that although …


Perceptual Evaluation Of Point-Based Object Representation, Paul Schwarz Nov 2004

Perceptual Evaluation Of Point-Based Object Representation, Paul Schwarz

Computer Science Honors Theses

Researchers have proposed several methods of representing three-dimensional objects in computer memory along with different methods of displaying these objects on two-dimensional computer displays. Using a polygon-based representation that linearly interpolates between a set of sample points is by far the most popular way of representing objects today, mostly because of its ability to display an object on a computer screen at a fast and consistent rate. However, as graphics hardware increases in speed, polygon-based models prove to be increasingly inefficient. Point-based representations have been proposed that consist of densely sampling some surface and using solely the samples to portray …


Does The Halting Necessary For Hardware Trace Collection Inordinately Perturb The Results?, Myles G. Watson Nov 2004

Does The Halting Necessary For Hardware Trace Collection Inordinately Perturb The Results?, Myles G. Watson

Theses and Dissertations

Processor address traces are invaluable for characterizing workloads and testing proposed memory hierarchies. Long traces are needed to exercise modern cache designs and produce meaningful results, but are difficult to collect with hardware monitors because microprocessors access memory too frequently for disks or other large storage to keep up. The small, fast buffers of the monitors fill quickly; in order to obtain long contiguous traces, the processor must be stopped while the buffer is emptied. This halting may perturb the traces collected, but this cannot be measured directly, since long uninterrupted traces cannot be collected. We make the case that …


Real-Time Image Enhancement Using Texture Synthesis, Matthew J. Sorensen Nov 2004

Real-Time Image Enhancement Using Texture Synthesis, Matthew J. Sorensen

Theses and Dissertations

This thesis presents an approach to real-time image enhancement using texture synthesis. Traditional image enhancement techniques are typically time consuming, lack realistic detail, or do not scale well for large magnification factors.

Real-time Enhancement using Texture Synthesis (RETS) combines interpolation, classification, and patch-based texture synthesis to enhance low-resolution imagery, particularly aerial imagery. RETS uses as input a low-resolution source image and several high-resolution sample textures. The output of RETS is a high-resolution image with the structure of the source image, but with detail consistent with the high-resolution sample textures. We show that RETS can enhance large amounts of imagery in …


1-Hyperbolic Projection For User Interfaces, Alexander Kolliopoulos Nov 2004

1-Hyperbolic Projection For User Interfaces, Alexander Kolliopoulos

Computer Science Honors Theses

The problem of dealing with representations of information that does not fit conveniently within allotted screen space is pervasive in graphical interfaces. While there are techniques for dealing with this problem in various ways, some properties of such existing techniques are not satisfying. For example, global structure of information may be lost in favor of local focus, or information may not be mapped into a rectangular area. The 1-hyperbolic interface is proposed to deal with some of these deficiencies, and the mathematics involved in display and interaction are derived. The calculations necessary for this interface are easy to implement, and …


Improved Signal Integrity In Ieee 1149.1 Boundary Scan Designs, Efren De Jesus Rangel Taboada Nov 2004

Improved Signal Integrity In Ieee 1149.1 Boundary Scan Designs, Efren De Jesus Rangel Taboada

Theses and Dissertations

This work is an analysis of solutions to problems derived from inherent timing and signal integrity issues in the use and application of the IEEE 1149.1 Standard at the board level in conjunction with its test system. Setup or hold times violations may occur in a boundary scan chain using IEEE 1149.1 compliant devices. A practical study of the TDI-TDO scan data path has been conducted to show where problems may arise in relationship to a particular board topology and test system. This work points to differences between passing and failing scan path tests for problem characterization. Serial data flow …


Disk Based Model Checking, Tonglaga Bao Oct 2004

Disk Based Model Checking, Tonglaga Bao

Theses and Dissertations

Disk based model checking does not receive much attention in the model checking field becasue of its costly time overhead. In this thesis, we present a new disk based algorithm that can get close to or faster verification speed than a RAM based algorithm that has enough memory to complete its verification. This algorithm also outperforms Stern and Dill's original disk based algorithm. The algorithm partitions the state space to several files, and swaps files into and out of memory during verification. Compared with the RAM only algorithm, the new algoritm reduces hash table insertion time by reducing the cost …


Vision-Based Human Directed Robot Guidance, Richard B. Arthur Oct 2004

Vision-Based Human Directed Robot Guidance, Richard B. Arthur

Theses and Dissertations

This paper describes methods to track a user-defined point in the vision of a robot as it drives forward. This tracking allows a robot to keep itself directed at that point while driving so that it can get to that user-defined point. I develop and present two new multi-scale algorithms for tracking arbitrary points between two frames of video, as well as through a video sequence. The multi-scale algorithms do not use the traditional pyramid image, but instead use a data structure called an integral image (also known as a summed area table). The first algorithm uses edge-detection to track …


Performance Evaluation Of A Resource Discovery Service, Jue Wang Oct 2004

Performance Evaluation Of A Resource Discovery Service, Jue Wang

Dartmouth College Master’s Theses

In a pervasive computing environment, the number and variety of resources (services, devices, and contextual information resources) make it necessary for applications to accurately discover the best ones quickly. Thus a resource-discovery service, which locates specific resources and establishes network connections as better resources become available, is necessary for those applications. The performance of the resource-discovery service is important when the applications are in a dynamic and mobile environment. In this thesis, however, we do not focus on the resource- discovery technology itself, but the evaluation of the scalability and mobility of the resource discovery module in Solar, a context …


Computational Approaches To The Design And Analysis Of Stability Of Polypeptide Multilayer Thin Films, Bin Zheng Oct 2004

Computational Approaches To The Design And Analysis Of Stability Of Polypeptide Multilayer Thin Films, Bin Zheng

Doctoral Dissertations

The focus of this research is the development of computational approaches to understanding the physical basis of layer-by-layer assembly (LBL), a key methodology of nanomanufacturing. The results provided detailed information on structure which cannot be obtained directly by experiments.

The model systems chosen for study are polypeptide chains. Reasons for this are that polypeptides are no less polyelectrolytes than the more usual polyions, and one can control the primary structure of a polypeptide on a residue-by-residue basis using modern synthetic methods. Moreover, as peptides constitute one of the four major classes of biological macromolecules, research in this direction is expected …


Sense -Based Text Classification By Semantic Hierarchy Representation, Xiaogang Peng Oct 2004

Sense -Based Text Classification By Semantic Hierarchy Representation, Xiaogang Peng

Doctoral Dissertations

Automatic classification of web pages is an effective way to facilitate the process of retrieving information from the Internet. Currently, two major classification methods are used in this area: keyword-based classification and sense-based classification. For keyword-based classification, keywords often have different semantic meanings, and the correct keyword matching is largely based on using exactly the same keywords. Thus, the classification results of keyword-based classification are not always satisfying. Many sense-based classification algorithms and systems have been presented, but they pay little attention to the relationship between senses. In this dissertation, we present a method to automatically classify documents based on …