Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 80

Full-Text Articles in Entire DC Network

Towards Extending The Equilibrium Of Discrimination In The Internet To Its Fringes, Matthias Bärwolff Dec 2009

Towards Extending The Equilibrium Of Discrimination In The Internet To Its Fringes, Matthias Bärwolff

Matthias Bärwolff

The core insight to the history of the dynamics of limitations, restrictions, and discriminations on the Internet is that they are largely a corollary to the futility of obtaining an entirely 'neutral' design of the Internet that is both robust and scalable. The question then is how to arrange the necessary volume of discriminations so as to obtain a design as value free as possible, for only such a design can be in line with the premise of stipulating no values other than (1) good order at large, and (2) the appreciation of the pursuit of local purposes by individuals. …


With Words That Last, Sean Nicholls, Leesha Mckenny, M.G. Michael, K. Michael Dec 2009

With Words That Last, Sean Nicholls, Leesha Mckenny, M.G. Michael, K. Michael

M. G. Michael

No abstract provided.


Designing Short Term Trading Systems With Artificial Neural Networks, Bruce Vanstone, Gavin Finnie, Tobias Hahn Oct 2009

Designing Short Term Trading Systems With Artificial Neural Networks, Bruce Vanstone, Gavin Finnie, Tobias Hahn

Tobias Hahn

There is a long established history of applying Artificial Neural Networks (ANNs) to financial data sets. In this paper, the authors demonstrate the use of this methodology to develop a financially viable, short-term trading system. When developing short-term systems, the authors typically site the neural network within an already existing non-neural trading system. This paper briefly reviews an existing medium-term long-only trading system, and then works through the Vanstone and Finnie methodology to create a short-term focused ANN which will enhance this trading strategy. The initial trading strategy and the ANN enhanced trading strategy are comprehensively benchmarked both in-sample and …


An Ontology For Autonomic License Management, Qian Zhao, Mark Perry Oct 2009

An Ontology For Autonomic License Management, Qian Zhao, Mark Perry

Mark Perry

The license agreement can be seen as the knowledge source for a license management system. As such, it may be referenced by the system each time a new process is initiated. To facilitate access, a machine readable representation of the license agreement is highly desirable, but at the same time we do not want to sacrifice too much readability of such agreements by human beings. Creating an ontology as a formal knowledge representation of licensing not only meets the representation requirements, but also offers improvements to knowledge reusability owing to the inherent sharing nature of such representations. Furthermore, the XML-based …


A Framework For Automatic Sla Creation, Halina Kaminski, Mark Perry Oct 2009

A Framework For Automatic Sla Creation, Halina Kaminski, Mark Perry

Mark Perry

Negotiation is fundamental to business. Increased automation of business to business or business to customer interaction is demanding efficient but flexible systems that can manage the negotiation process with minimal direct human intervention. Industries that provide online services rely on Service Level Agreements as the basis for their contractual relationship. Here we look at a means for generating these with a negotiating tool (SLA Negotiation Manager) that complies with e-negotiation rules and creates the agreements from existing business objectives.


Policy Driven Licensing Model For Component Software, Zhao Qian, Zhou Yu, Mark Perry Oct 2009

Policy Driven Licensing Model For Component Software, Zhao Qian, Zhou Yu, Mark Perry

Mark Perry

Today, it is almost inevitable that software is licensed, rather than sold outright. As a part of the licensing policy, some protection mechanisms, whether hardware, legal or code-based, are invariably built into the license. The application of such mechanisms has primarily been in the realm of off-the-shelf, packaged, consumer software. However, as component-based software gradually becomes mainstream in software development, new component-oriented licensing systems are required. This paper proposes an enterprise component licensing model for the management of software component licenses. The model provides a comprehensive license management framework allowing for extensibility and flexibility. Furthermore, we identify differences between stand-alone …


An Integrated Service Model Approach For Enabling Soa, Liang-Jie Zhang, Jia Zhang Sep 2009

An Integrated Service Model Approach For Enabling Soa, Liang-Jie Zhang, Jia Zhang

Jia Zhang

No abstract provided.


Controlling Technology, K. Michael, M. G. Michael Sep 2009

Controlling Technology, K. Michael, M. G. Michael

M. G. Michael

No abstract provided.


Digital Audio In The Library, Richard Griscom Sep 2009

Digital Audio In The Library, Richard Griscom

Richard Griscom

An incomplete draft of a book intended to serve as a guide and reference for librarians who are responsible for implementing digital audio services in their libraries. The book is divided into two parts. Part 1, "Digital Audio Technology," covers the fundamentals of recorded sound and digital audio, including a description of digital audio formats, how digital audio is delivered to the listener, and how digital audio is created. Part 2, "Digital Audio in the Library," covers digitizing local collections, providing streaming audio reserves, and using digital audio to preserve analog recordings.


Componentization Of Business Process Layer In The Soa Reference Architecture, Liang-Jie Zhang, Jia Zhang Aug 2009

Componentization Of Business Process Layer In The Soa Reference Architecture, Liang-Jie Zhang, Jia Zhang

Jia Zhang

No abstract provided.


Architecture-Driven Variation Analysis For Designing Cloud Applications, Liang-Jie Zhang, Jia Zhang Aug 2009

Architecture-Driven Variation Analysis For Designing Cloud Applications, Liang-Jie Zhang, Jia Zhang

Jia Zhang

Service Oriented Architecture (SOA) is one central technical foundation supporting the rapidly emerging Cloud Computing paradigm. To date, however, its application practice is not always successful. One major reason is the lack of a systematic engineering process and tool supported by reusable architectural artifacts. Toward this ultimate goal, this paper proposes a variationoriented analysis method of performing architectural building blocks (ABB)-based SOA solution design for enabling cloud application design. We present the modeling of solution-level architectural artifacts and their relationships, whose formalization enables eventbased variation notification and propagation analysis. We report a prototype tool and describe how we extend the …


Computer Assisted Diagnoses For Red Eye (Cadre), Dr. Muhammad Zubair Asghar Aug 2009

Computer Assisted Diagnoses For Red Eye (Cadre), Dr. Muhammad Zubair Asghar

Dr. Muhammad Zubair Asghar

This paper introduces an expert System (ES) named as “CADRE-Computer Assisted Diagnoses for Red Eye. Mostly the remote areas of the population are deprived of the facilities of having experts in eye disease. So it is the need of the day to store the expertise of Eye specialists in computers through using ES technology. This ES is a rule-based Expert System that assists in red-eye diagnosis and treatment. The knowledge acquired from literature review and human experts of the specific domain was used as a base for analysis, diagnosis and recommendations. CADRE evaluates the risk factors of 20 eye diseases …


Structure Theorem And Strict Alternation Hierarchy For Fo2 On Words, Philipp Weis, Neil Immerman Aug 2009

Structure Theorem And Strict Alternation Hierarchy For Fo2 On Words, Philipp Weis, Neil Immerman

Neil Immerman

It is well-known that every first-order property on words is expressible using at most three variables. The subclass of properties expressible with only two variables is also quite interesting and well-studied. We prove precise structure theorems that characterize the exact expressive power of first-order logic with two variables on words. Our results apply to both the case with and without a successor relation.

For both languages, our structure theorems show exactly what is expressible using a given quantifier depth, n, and using m blocks of alternating quantifiers, for any m ≤ n. Using these characterizations, we prove, among other results, …


Lazy-Adaptive Tree: An Optimized Index Structure For Flash Devices, D. Agrawal, D. Ganesan, Ramesh K. Sitaraman, Y. Diao, S. Singh Jul 2009

Lazy-Adaptive Tree: An Optimized Index Structure For Flash Devices, D. Agrawal, D. Ganesan, Ramesh K. Sitaraman, Y. Diao, S. Singh

Ramesh Sitaraman

Flash memories are in ubiquitous use for storage on sensor nodes, mobile devices, and enterprise servers. However, they present significant challenges in designing tree indexes due to their fundamentally different read and write characteristics in comparison to magnetic disks. In this paper, we present the Lazy-Adaptive Tree (LA-Tree), a novel index structure that is designed to improve performance by minimizing accesses to ash. The LA-tree has three key features: 1) it amortizes the cost of node reads and writes by performing update operations in a lazy manner using cascaded buffers, 2) it dynamically adapts buffer sizes to workload using an …


Cayley-Dixon Projection Operator For Multi-Univariate Composed Polynomials, Arthur Chtcherba, Deepak Kapur, Manfred Minimair Jul 2009

Cayley-Dixon Projection Operator For Multi-Univariate Composed Polynomials, Arthur Chtcherba, Deepak Kapur, Manfred Minimair

Manfred Minimair

The Cayley-Dixon formulation for multivariate projection operators (multiples of resultants of multivariate polynomials) has been shown to be efficient (both exper- imentally and theoretically) for simultaneously eliminating many variables from a polynomial system. In this paper, the behavior of the Cayley-Dixon projection op- erator and the structure of Dixon matrices are analyzed for composed polynomial systems constructed from a multivariate system in which each variable is substi- tuted by a univariate polynomial in a distinct variable. Under some conditions, it is shown that a Dixon projection operator of the composed system can be expressed as a power of the resultant …


Relating State-Based And Process-Based Concurrency Through Linear Logic, Iliano Cervesato, Andre Scedrov Jul 2009

Relating State-Based And Process-Based Concurrency Through Linear Logic, Iliano Cervesato, Andre Scedrov

Iliano Cervesato

This paper has the purpose of reviewing some of the established relationships between logic and concurrency, and of exploring new ones. Concurrent and distributed systems are notoriously hard to get right. Therefore, following an approach that has proved highly beneficial for sequential programs, much effort has been invested in tracing the foundations of concurrency in logic. The starting points of such investigations have been various idealized languages of concurrent and distributed programming, in particular the well-established state-transformation model inspired by Petri nets and multiset rewriting, and the prolific process-based models such as the π-calculus and other process algebras. In nearly …


Architectural Mismatch: Why Reuse Is Still So Hard, David Garlan, Robert Allen, John Mark Ockerbloom Jul 2009

Architectural Mismatch: Why Reuse Is Still So Hard, David Garlan, Robert Allen, John Mark Ockerbloom

John Mark Ockerbloom

In this article, David Garlan, Robert Allen, and John Ockerbloom reflect on the state of architectural mismatch, a term they coined in their 1995 IEEE Software article, "Architectural Mismatch: Why Reuse Is So Hard." Although the nature of software systems has changed dramatically since the earlier article was published, the challenge of architectural mismatch remains an important concern for the software engineering field.


Using Rfid To Overcome Inventory Control Challenges: A Proof Of Concept, Dane Hamilton, Katina Michael, Samuel Fosso Wamba Jul 2009

Using Rfid To Overcome Inventory Control Challenges: A Proof Of Concept, Dane Hamilton, Katina Michael, Samuel Fosso Wamba

Dr Samuel Fosso Wamba

Using a Proof of Concept approach, this paper examines RFID’s impact on inventory control of a small-to-medium retailer. Results indicate that RFID technology can function effectively in a small-to-medium hardware environment. Also, the majority of the simulations recorded reasonable read rates even though the simulations were set up over a short period of time without a great deal of fine-tuning. Moreover, RFID could have a positive impact on the inventory-related processes of the organisation by either streamlining or formalizing them and facilitate the electronic storage of information captured in real-time, relating to the movement of stock and the amount of …


Using Rfid To Overcome Inventory Control Challenges: A Proof Of Concept, Dane Hamilton, Katina Michael, Samuel Fosso Wamba Jul 2009

Using Rfid To Overcome Inventory Control Challenges: A Proof Of Concept, Dane Hamilton, Katina Michael, Samuel Fosso Wamba

Professor Katina Michael

Using a Proof of Concept approach, this paper examines RFID’s impact on inventory control of a small-to-medium retailer. Results indicate that RFID technology can function effectively in a small-to-medium hardware environment. Also, the majority of the simulations recorded reasonable read rates even though the simulations were set up over a short period of time without a great deal of fine-tuning. Moreover, RFID could have a positive impact on the inventory-related processes of the organisation by either streamlining or formalizing them and facilitate the electronic storage of information captured in real-time, relating to the movement of stock and the amount of …


Design Of Service Component Layer In Soa Reference Architecture, Liang-Jie Zhang, Jia Zhang Jun 2009

Design Of Service Component Layer In Soa Reference Architecture, Liang-Jie Zhang, Jia Zhang

Jia Zhang

No abstract provided.


Collaborative Scientific Workflows, Shiyong Lu, Jia Zhang Jun 2009

Collaborative Scientific Workflows, Shiyong Lu, Jia Zhang

Jia Zhang

In recent years, a number of scientific workflow management systems (SWFMSs) have been developed to help domain scientists synergistically integrate distributed computations, datasets, and analysis tools to enable and accelerate scientific discoveries. As more scientific research projects become collaborative in nature, there is a compelling need of dedicated services to support collaborative scientific workflows on the Internet. This paper reviews the state of the art of the field of scientific workflows towards the support of collaborative scientific workflows, identifies critical research challenges, and presents our ongoing research work aiming to study how to create services supporting collaborative scientific workflows.


Developing Large-Scale Bayesian Networks By Composition: Fault Diagnosis Of Electrical Power Systems In Aircraft And Spacecraft, Ole J. Mengshoel, Scott Poll, Tolga Kurtoglu Jun 2009

Developing Large-Scale Bayesian Networks By Composition: Fault Diagnosis Of Electrical Power Systems In Aircraft And Spacecraft, Ole J. Mengshoel, Scott Poll, Tolga Kurtoglu

Ole J Mengshoel

In this paper, we investigate the use of Bayesian networks to construct large-scale diagnostic systems. In particular, we consider the development of large-scale Bayesian networks by composition. This compositional approach reflects how (often redundant) subsystems are architected to form systems such as electrical power systems. We develop high-level specifiations, Bayesian networks, clique trees, and arithmetic circuits representing 24 different electrical power systems. The largest among these 24 Bayesian networks contains over 1,000 random variables. Another BN represents the real-world electrical power system ADAPT, which is representative of electrical power systems deployed in aerospace vehicles. In addition to demonstrating the scalability …


Diagnosis And Reconfiguration Using Bayesian Networks: An Electrical Power System Case Study, W. Bradley Knox, Ole J. Mengshoel Jun 2009

Diagnosis And Reconfiguration Using Bayesian Networks: An Electrical Power System Case Study, W. Bradley Knox, Ole J. Mengshoel

Ole J Mengshoel

Automated diagnosis and reconfiguration are important computational techniques that aim to minimize human intervention in autonomous systems. In this paper, we develop novel techniques and models in the context of diagnosis and reconfiguration reasoning using causal Bayesian networks (BNs). We take as starting point a successful diagnostic approach, using a static BN developed for a real-world electrical power system. We discuss in this paper the extension of this diagnostic approach along two dimensions, namely: (i) from a static BN to a dynamic BN; and (ii) from a diagnostic task to a reconfiguration task.

More specifically, we discuss the auto-generation of …


Location-Based Services For Emergency Management: A Multi-Stakeholder Perspective, Anas Aloudat, K. Michael, Roba Abbas Jun 2009

Location-Based Services For Emergency Management: A Multi-Stakeholder Perspective, Anas Aloudat, K. Michael, Roba Abbas

Dr Roba Abbas

This paper investigates the deployment of locationbased services for nationwide emergency management by focusing on the perspectives of two stakeholders, government and end-users, in the cellular mobile phone value chain. The data collected for the study came from a single in-depth interview and open comments in a preliminary end-user survey. The themes presented have been categorised using a qualitative analysis. The findings indicate that although governments and end-users believe that location-based services have the potential to aid people in emergencies, there are several major disagreements over the proposed deployment. This paper is an attempt to help determine the underlying motivations …


The Current State Of Commercial Location-Based Service Offerings In Australia, Roba Abbas, K. Michael, M.G. Michael, Anas Aloudat Jun 2009

The Current State Of Commercial Location-Based Service Offerings In Australia, Roba Abbas, K. Michael, M.G. Michael, Anas Aloudat

M. G. Michael

Location-based services (LBS) provide geographic data for a variety of purposes, and through numerous devices such as mobile phones, GPS navigation systems, palm pilots and increasingly desktop computers. Presently, there is scant information relating to the current state of the LBS market, specifically location-based service applications in Australia. This study makes use of usability context analyses to examine Australia’s three leading telecommunications operators- Telstra, Optus and Vodafone- with a view to providing an overview of the types of services and solutions presently offered and targeted at the consumer, business and emergency segments. There are two units of analysis (i) the …


Triangle Network Motifs Predict Complexes By Complementing High-Error Interactomes With Structural Information, Bill Andreopoulos, Christof Winter, Dirk Labudde, Michael Schroeder Jun 2009

Triangle Network Motifs Predict Complexes By Complementing High-Error Interactomes With Structural Information, Bill Andreopoulos, Christof Winter, Dirk Labudde, Michael Schroeder

William B. Andreopoulos

Background
A lot of high-throughput studies produce protein-protein interaction networks (PPINs) with many errors and missing information. Even for genome-wide approaches, there is often a low overlap between PPINs produced by different studies. Second-level neighbors separated by two protein-protein interactions (PPIs) were previously used for predicting protein function and finding complexes in high-error PPINs. We retrieve second level neighbors in PPINs, and complement these with structural domain-domain interactions (SDDIs) representing binding evidence on proteins, forming PPI-SDDI-PPI triangles.

Results
We find low overlap between PPINs, SDDIs and known complexes, all well below 10%. We evaluate the overlap of PPI-SDDI-PPI triangles with …


Scholarship In The Digital Age: Blurring The Boundaries Between The Sciences And The Humanities (Keynote), Christine L. Borgman Jun 2009

Scholarship In The Digital Age: Blurring The Boundaries Between The Sciences And The Humanities (Keynote), Christine L. Borgman

Christine L. Borgman

As the digital humanities mature, their scholarship is taking on many characteristics of the sciences, becoming more data-intensive, information-intensive, distributed, multi-disciplinary, and collaborative. While few scholars in the humanities or arts would wish to be characterized as emulating scientists, they do envy the comparatively rich technical and resource infrastructure of the sciences. The interests of all scholars in the university align with respect to access to data, library resources, and computing infrastructure. However, the scholarly interests of the sciences and humanities diverge regarding research practices, sources of evidence, and degrees of control over those sources. This talk will explore the …


Open Discovery Of Library Resources: The Digital Library Federation's Ils-Discovery Interface Recommendations, John Mark Ockerbloom Jun 2009

Open Discovery Of Library Resources: The Digital Library Federation's Ils-Discovery Interface Recommendations, John Mark Ockerbloom

John Mark Ockerbloom

A NISO webinar presentation on the ILS-DI work, its design, its implementation, and its future. Based in part on my ALA talk in January, but reworked and updated. The PDF file includes both slides and my speaker's script. (My actual remarks in the live presentation differed slightly in places.)


An Intelligent Agent For A Vacuum Cleaner, Dr. Muhammad Zubair Asghar Jun 2009

An Intelligent Agent For A Vacuum Cleaner, Dr. Muhammad Zubair Asghar

Dr. Muhammad Zubair Asghar

This paper introduces an Intelligent agent for the vacuum cleaner named as VROBO. Objectives of this work are to prepare a pedagogical device for Artificial Intelligence students and to practically implement the Artificial Intelligent Technology in real world problems to enhance the physical capabilities of human being. Most of the significant Intelligent Agent’s attributes like; Goals, Perception, Autonomy and Action, may be found in this agent. Two options are given for the implementation of proposed setup i.e. Screen oriented simulation developed in java and Java API for “real” robotic simulation using LEGO Mindstorms robots developed by Frank and Scott. Home …


A Game Theory Approach For The Reallocation Of Security Forces Against Terrorist Diversionary Attacks, Cheng-Kuang Wu Jun 2009

A Game Theory Approach For The Reallocation Of Security Forces Against Terrorist Diversionary Attacks, Cheng-Kuang Wu

Cheng-Kuang Wu

Terrorists tend to coordinate multiple raids which, combined with diversionary attacks are designed to divert the attention of the security forces, causing them to take a longer time to respond. This in turn enables the terrorists to cause more casualties at their primary target. It is important to efficiently reallocate the available security forces to meet these terrorist attacks, especially when the available resources are limited. In this paper we proposed two game theory-based models for the reallocation of security forces for the purpose of countering both primary and diversionary attacks in an urban environment. The first model is used …