Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

PDF

2009

Computer Science

Discipline
Institution
Publication
Publication Type

Articles 1 - 30 of 32

Full-Text Articles in Entire DC Network

An Ontology For Autonomic License Management, Qian Zhao, Mark Perry Oct 2009

An Ontology For Autonomic License Management, Qian Zhao, Mark Perry

Mark Perry

The license agreement can be seen as the knowledge source for a license management system. As such, it may be referenced by the system each time a new process is initiated. To facilitate access, a machine readable representation of the license agreement is highly desirable, but at the same time we do not want to sacrifice too much readability of such agreements by human beings. Creating an ontology as a formal knowledge representation of licensing not only meets the representation requirements, but also offers improvements to knowledge reusability owing to the inherent sharing nature of such representations. Furthermore, the XML-based …


A Framework For Automatic Sla Creation, Halina Kaminski, Mark Perry Oct 2009

A Framework For Automatic Sla Creation, Halina Kaminski, Mark Perry

Mark Perry

Negotiation is fundamental to business. Increased automation of business to business or business to customer interaction is demanding efficient but flexible systems that can manage the negotiation process with minimal direct human intervention. Industries that provide online services rely on Service Level Agreements as the basis for their contractual relationship. Here we look at a means for generating these with a negotiating tool (SLA Negotiation Manager) that complies with e-negotiation rules and creates the agreements from existing business objectives.


Policy Driven Licensing Model For Component Software, Zhao Qian, Zhou Yu, Mark Perry Oct 2009

Policy Driven Licensing Model For Component Software, Zhao Qian, Zhou Yu, Mark Perry

Mark Perry

Today, it is almost inevitable that software is licensed, rather than sold outright. As a part of the licensing policy, some protection mechanisms, whether hardware, legal or code-based, are invariably built into the license. The application of such mechanisms has primarily been in the realm of off-the-shelf, packaged, consumer software. However, as component-based software gradually becomes mainstream in software development, new component-oriented licensing systems are required. This paper proposes an enterprise component licensing model for the management of software component licenses. The model provides a comprehensive license management framework allowing for extensibility and flexibility. Furthermore, we identify differences between stand-alone …


Computer Science Discipline Assessment Report 2009, Computer Science Discipline Oct 2009

Computer Science Discipline Assessment Report 2009, Computer Science Discipline

Assessment of Student Learning Reports

No abstract provided.


On The Thermal Activation Of Negative Bias Temperature Instability, Richard G. Southwick Iii, William B. Knowlton, Ben Kaczer, Tibor Grasser Oct 2009

On The Thermal Activation Of Negative Bias Temperature Instability, Richard G. Southwick Iii, William B. Knowlton, Ben Kaczer, Tibor Grasser

Materials Science and Engineering Faculty Publications and Presentations

The temperature dependence of negative bias temperature instability (NBTI) is investigated on 2.0nm SiO2 devices from temperatures ranging from 300K down to 6K with a measurement window of ~12ms to 100s. Results indicate that classic NBTI degradation is observed down to ~200K and rarely observed at temperatures below 140K in the experimental window. Since experimental results show the charge trapping component contributing to NBTI is thermally activated, the results cannot be explained with the conventionally employed elastic tunneling theory. A new mechanism is observed at temperatures below 200K where device performance during stress conditions improves rather than degrades with …


Copyright For Students And Teachers, Ruth Jungman Oct 2009

Copyright For Students And Teachers, Ruth Jungman

Information Literacy Resources for Curriculum Development

No abstract provided.


Project Proposal, Yu Zhang Oct 2009

Project Proposal, Yu Zhang

Information Literacy Resources for Curriculum Development

No abstract provided.


Pictures That Lie, Lyn Belisle Oct 2009

Pictures That Lie, Lyn Belisle

Information Literacy Resources for Curriculum Development

No abstract provided.


Chip-Scale Nanophotonic Chemical And Biological Sensors Using Cmos Process, Lincoln Bollschweiler, Alex English, R. Jacob Baker, Wan Kuang, Zi-Chang Chang, Ming-Hsiung Shih, William Knowlton Aug 2009

Chip-Scale Nanophotonic Chemical And Biological Sensors Using Cmos Process, Lincoln Bollschweiler, Alex English, R. Jacob Baker, Wan Kuang, Zi-Chang Chang, Ming-Hsiung Shih, William Knowlton

Electrical and Computer Engineering Faculty Publications and Presentations

A monolithic integrated chip-scale surface plasmon resonance (SPR) sensor is demonstrated. The device consists of a pn photodiode covered with a periodic modified thin metal film whose lattice constant is on the order of the wavelength of light. The device performs real-time measurement of resonant wavelengths of enhanced optical transmission due to surface plasmon resonance, which are influenced by the presence of chemical or biological materials at the device’s surface.


Alumni Provide Tech Solutions With Integrity, Iwu Magazine Jul 2009

Alumni Provide Tech Solutions With Integrity, Iwu Magazine

Illinois Wesleyan University Magazine, 2002-2017

Two IWU alumni are using their technological know-how to help schools, students and small businesses succeed.


Conference Proceedings, Youtube And The 2008 Election Cycle Apr 2009

Conference Proceedings, Youtube And The 2008 Election Cycle

YouTube and the 2008 Election Cycle in the United States

The YouTube and the 2008 Election Cycle in the United States Conference took place April 16-17, 2009 at the University of Massachusetts Amherst. The conference brought together political and computer scientists to explore the electoral impact of user-created YouTube technologies and to demonstrate new technical and analytic opportunities associated with new media technologies and politics. The conference proceedings includes copies of all papers presented at the conference as well as abstracts of all posters and keynote presentations.


Fractional Weak Discrepancy And Interval Orders, Alan Shuchat, Randy Shull, Ann N. Trenk Apr 2009

Fractional Weak Discrepancy And Interval Orders, Alan Shuchat, Randy Shull, Ann N. Trenk

Faculty Research and Scholarship

The fractional weak discrepancy wdF(P) of a poset P=(V,≺) was introduced in [A. Shuchat, R. Shull, A. Trenk, The fractional weak discrepancy of a partially ordered set, Discrete Applied Mathematics 155 (2007) 2227–2235] as the minimum nonnegative k for which there exists a function satisfying (i) if a≺b then f(a)+1≤f(b) and (ii) if a∥b then |f(a)−f(b)|≤k. In this paper we generalize results in [A. Shuchat, R. Shull, A. Trenk, Range of the fractional weak discrepancy function, ORDER 23 (2006) 51–63; A. Shuchat, R. Shull, A. Trenk, Fractional weak discrepancy of posets and certain forbidden configurations, in: S.J. Brams, …


Computer Science Course Proposal 03/11/09, Curriculum Committee Mar 2009

Computer Science Course Proposal 03/11/09, Curriculum Committee

Curriculum Committee Reports

No abstract provided.


The Battle For The 2008 Us Congressional Elections On The Web, P. Takis Metaxas, Eni Mustafaraj Mar 2009

The Battle For The 2008 Us Congressional Elections On The Web, P. Takis Metaxas, Eni Mustafaraj

Faculty Research and Scholarship

It has been reported that, in the past, political activists have tried to influence web search results. They did that using link-bombing techniques to raise negative web pages with contents close to the their agendas to the top-10 search results. Google has admitted that this happen in the 2006 US Elections, but did it still happen in the all-important 2008 US Congressional Elections? In this paper we try to evaluate whether “gaming” the search engines during the election period is a widespread problem, how serious is it, and how search engines have tried to maintain the integrity of their search …


Sla Automated Negotiation Manager For Computing Services, Halina Kaminski, Mark Perry Jan 2009

Sla Automated Negotiation Manager For Computing Services, Halina Kaminski, Mark Perry

Mark Perry

Success in today’s marketing arena can often depend on companies embracing effective new technologies and integrating them into their business model. In the computing service supply industry, Service Level Agreements (SLAs) are commonly prepared and signed agreements between the service provider and its customers. SLAs should match business needs of both sides of the agreement as closely as possible. This paper focuses on at the steps and activities that the service provider can take to facilitate agreement. It proposes an automated way for creating SLA’s from a set of Service Level Objectives (SLOs). The SLA should achieve business goals, including …


Policies, Rules And Their Engines: What Do They Mean For Slas?, Mark Perry, Michael Bauer Jan 2009

Policies, Rules And Their Engines: What Do They Mean For Slas?, Mark Perry, Michael Bauer

Mark Perry

In our model for autonomic management of service level agreements (SLA), the roles played by policy and rules must be clearly differentiated. Although policy is typically an ideal we wish to achieve through the implementation of rules, the use of the terms policy and rule are often treated similarly and that consequently policy-engine and rule-engine are often used synonymously. It is our position that in the management of SLAs these terms have specific meanings. The definitions and models embodied are illustrated.


Verifiable Electronic Voting System: An Open Source Solution, Halina Kaminski, Mark Perry Jan 2009

Verifiable Electronic Voting System: An Open Source Solution, Halina Kaminski, Mark Perry

Mark Perry

Elections, referenda and polls are vital processes for the operation of a modern democracy. They form the mechanism for transferring power from citizens to their representatives. Although some commentators claim that the pencil-and-paper systems used in countries such as Canada and UK are still the best method of avoiding voterigging, recent election problems, and the need for faster, better, cheaper vote counting, have stimulated great interest in managing the election process through the use of electronic voting systems. While computer scientists, for the most part, have been warning of the possible perils of such action, vendors have forged ahead with …


Open Source Software Licensing Patterns, Halina Kaminski, Mark Perry Jan 2009

Open Source Software Licensing Patterns, Halina Kaminski, Mark Perry

Mark Perry

No abstract provided.


New Computational Approaches For Multiple Rna Alignment And Rna Search, Daniel Deblasio Jan 2009

New Computational Approaches For Multiple Rna Alignment And Rna Search, Daniel Deblasio

Electronic Theses and Dissertations

In this thesis we explore the the theory and history behind RNA alignment. Normal sequence alignments as studied by computer scientists can be completed in O(n2) time in the naive case. The process involves taking two input sequences and finding the list of edits that can transform one sequence into the other. This process is applied to biology in many forms, such as the creation of multiple alignments and the search of genomic sequences. When you take into account the RNA sequence structure the problem becomes even harder. Multiple RNA structure alignment is particularly challenging because covarying mutations make sequence …


Collapsible Graphs And Reductions Of Line Graphs, Zhi-Hong Chen, Peter C.B. Lam, Wai-Chee Shiu Jan 2009

Collapsible Graphs And Reductions Of Line Graphs, Zhi-Hong Chen, Peter C.B. Lam, Wai-Chee Shiu

Scholarship and Professional Work - LAS

A graph G is collapsible if for every even subset X ⊆ V ( G ) , G has a subgraph such that G − E ( Γ ) is connected and the set of odd-degree vertices of Γ is X . A graph obtained by contracting all the non-trivial collapsible subgraphs of G is called the reduction of G . In this paper, we characterize graphs of diameter two in terms of collapsible subgraphs and investigate the relationship between the line graph of the reduction and the reduction of the line graph. Our results extend former results in [H.-J. …


Apco Project 25 Wireless Data Services Over Land Mobile Radio Channel For Smaller Law Enforcement Agencies, Ivan Elhart Jan 2009

Apco Project 25 Wireless Data Services Over Land Mobile Radio Channel For Smaller Law Enforcement Agencies, Ivan Elhart

Master's Theses and Capstones

Digital data messages are very important in modern communication systems and advanced mobile data technologies have opened the door to a wide range of applications and services in the public safety environment. Still, the availability of mobile data services among public safety agencies is hampered by two issues of the implementation of data communication: the reliability of commercial data services and the high cost of the equipment needed to support mixed voice and data transmissions over private land mobile radio channels.

This thesis describes the design and development of an inexpensive Software Defined APCO Project 25 Data Base Station that …


A Computer Science Approach To Identify And Classify Hyperactivated Spermatozoa, Norbert Kaula Jan 2009

A Computer Science Approach To Identify And Classify Hyperactivated Spermatozoa, Norbert Kaula

Electronic Theses and Dissertations

Effective Assisted Reproductive Technology (ART) relies in part upon accurate but easily conducted measurements of sperm motion parameters. Several established methods are widely used to assess possible reasons for male infertility, in human and veterinary Andrology clinics. Computer-assisted sperm analysis (CASA) devices quantitatively assess sperm motion parameters, which have been defined by the World Health Organization, and include the percentage of motile cells in a sample and the motion characteristics of individual cells, such as curvilinear velocity (VCL), average path velocity (VAP) and straight line velocity (VSL). However, CASA analyses fail to define hyperactive sperm motility or determine the prevalence …


Isolation And Dependency Resolution Of Presentation, Processing And Persistence, Mehrab Monjur Jan 2009

Isolation And Dependency Resolution Of Presentation, Processing And Persistence, Mehrab Monjur

Master's Theses (2009 -)

For business application development it is important to isolate programming efforts of the concerns: Presentation, Processing and Persistence. Development of each of these concerns has an independent thinking process and requires somewhat different programming languages and development tools. In order to isolate the concerns, we provide passages between the concerns and control the flow of execution by following essentially three rules: 1. Presentation and Processing are coroutines, 2. Processing is finished before Presentation can begin to show output, and 3. Persistence is a subsystem of Processing. We explain how these rules come to existence, and what the implications are in …


Order Acceptance Using Genetic Algorithms, Walter O. Rom, Susan A. Slotnick Jan 2009

Order Acceptance Using Genetic Algorithms, Walter O. Rom, Susan A. Slotnick

Business Faculty Publications

This paper uses a genetic algorithm to solve the order-acceptance problem with tardiness penalties. We compare the performance of a myopic heuristic and a genetic algorithm, both of which do job acceptance and sequencing, using an upper bound based on an assignment relaxation. We conduct a pilot study, in which we determine the best settings for diversity operators (clone removal, mutation, immigration, population size) in connection with different types of local search. Using a probabilistic local search provides results that are almost as good as exhaustive local search, with much shorter processing times. Our main computational study shows that the …


Adaptive Middleware For Resource-Constrained Mobile Ad Hoc And Wireless Sensor Networks, Chien-Liang Fok Jan 2009

Adaptive Middleware For Resource-Constrained Mobile Ad Hoc And Wireless Sensor Networks, Chien-Liang Fok

All Theses and Dissertations (ETDs)

Mobile ad hoc networks: MANETs) and wireless sensor networks: WSNs) are two recently-developed technologies that uniquely function without fixed infrastructure support, and sense at scales, resolutions, and durations previously not possible. While both offer great potential in many applications, developing software for these types of networks is extremely difficult, preventing their wide-spread use. Three primary challenges are: 1) the high level of dynamics within the network in terms of changing wireless links and node hardware configurations,: 2) the wide variety of hardware present in these networks, and: 3) the extremely limited computational and energy resources available. Until now, the burden …


Statistical Aggregation: Theory And Applications, Ruibin Xi Jan 2009

Statistical Aggregation: Theory And Applications, Ruibin Xi

All Theses and Dissertations (ETDs)

Due to their size and complexity, massive data sets bring many computational challenges for statistical analysis, such as overcoming the memory limitation and improving computational efficiency of traditional statistical methods. In the dissertation, I propose the statistical aggregation strategy to conquer such challenges posed by massive data sets. Statistical aggregation partitions the entire data set into smaller subsets, compresses each subset into certain low-dimensional summary statistics and aggregates the summary statistics to approximate the desired computation based on the entire data. Results from statistical aggregation are required to be asymptotically equivalent. Statistical aggregation processes the entire data set part by …


Networking Mechanisms For Delay-Sensitive Applications, Maxim Podlesny Jan 2009

Networking Mechanisms For Delay-Sensitive Applications, Maxim Podlesny

All Theses and Dissertations (ETDs)

The diversity of applications served by the explosively growing Internet is increasing. In particular, applications that are sensitive to end-to-end packet delays become more common and include telephony, video conferencing, and networked games. While the single best-effort service of the current Internet favors throughput-greedy traffic by equipping congested links with large buffers, long queuing at the congested links hurts the delay-sensitive applications. Furthermore, while numerous alternative architectures have been proposed to offer diverse network services, the innovative alternatives failed to gain widespread end-to-end deployment. This dissertation explores different networking mechanisms for supporting low queueing delay required by delay-sensitive applications. In …


Design And Evaluation Of Distributed Algorithms For Placement Of Network Services, Todd Sproull Jan 2009

Design And Evaluation Of Distributed Algorithms For Placement Of Network Services, Todd Sproull

All Theses and Dissertations (ETDs)

Network services play an important role in the Internet today. They serve as data caches for websites, servers for multiplayer games and relay nodes for Voice over IP: VoIP) conversations. While much research has focused on the design of such services, little attention has been focused on their actual placement. This placement can impact the quality of the service, especially if low latency is a requirement. These services can be located on nodes in the network itself, making these nodes supernodes. Typically supernodes are selected in either a proprietary or ad hoc fashion, where a study of this placement is …


Scheduling Policy Design Using Stochastic Dynamic Programming, Robert Glaubius Jan 2009

Scheduling Policy Design Using Stochastic Dynamic Programming, Robert Glaubius

All Theses and Dissertations (ETDs)

Scheduling policies for open soft real-time systems must be able to balance the competing concerns of meeting their objectives under exceptional conditions while achieving good performance in the average case. Balancing these concerns requires modeling strategies that represent the range of possible task behaviors, and solution techniques that are capable of effectively managing uncertainty in order to discover scheduling policies that are effective across the range of system modes. We develop methods for solving a particular class of task scheduling problems in an open soft real-time setting involving repeating, non-preemptable tasks that contend for a single shared resource. We enforce …


Structural Rna Homology Search And Alignment Using Covariance Models, Eric Nawrocki Jan 2009

Structural Rna Homology Search And Alignment Using Covariance Models, Eric Nawrocki

All Theses and Dissertations (ETDs)

Functional RNA elements do not encode proteins, but rather function directly as RNAs. Many different types of RNAs play important roles in a wide range of cellular processes, including protein synthesis, gene regulation, protein transport, splicing, and more. Because important sequence and structural features tend to be evolutionarily conserved, one way to learn about functional RNAs is through comparative sequence analysis - by collecting and aligning examples of homologous RNAs and comparing them. Covariance models: CMs) are powerful computational tools for homology search and alignment that score both the conserved sequence and secondary structure of an RNA family. However, due …