Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

2006

Computer science

Discipline
Institution
Publication
Publication Type
File Type

Articles 1 - 30 of 31

Full-Text Articles in Entire DC Network

Multiple Message Broadcasting And Gossiping In The Dynamically Orientable Graphs, Gayane R. Goltukhchyan Dec 2006

Multiple Message Broadcasting And Gossiping In The Dynamically Orientable Graphs, Gayane R. Goltukhchyan

Graduate Theses, Dissertations, and Problem Reports

This research investigates the problems of gossiping and multiple message broadcasting in dynamically orientable graphs of different network topologies. These are new problems never attempted before. Dynamically orientable graphs and six different network topologies are considered: paths, cycles, stars, binary trees, complete trees and two-dimensional grids. Information dissemination in graphs that are dynamically orientable requires that number of messages sent in each direction along an edge be balanced and therefore necessitates a different approach in gossiping and multiple message broadcasting.;The obvious upper bound for gossiping and multiple message broadcasting in dynamically orientable graphs is twice the best known time for …


Multispectral Iris Recognition Analysis: Techniques And Evaluation, Christopher K. Boyce Dec 2006

Multispectral Iris Recognition Analysis: Techniques And Evaluation, Christopher K. Boyce

Graduate Theses, Dissertations, and Problem Reports

This thesis explores the benefits of using multispectral iris information acquired using a narrow-band multispectral imaging system. Commercial iris recognition systems typically sense the iridal reflection pertaining to the near-infrared (IR) range of the electromagnetic spectrum. While near-infrared imaging does give a very reasonable image of the iris texture, it only exploits a narrow band of spectral information. By incorporating other wavelength ranges (infrared, red, green, blue) in iris recognition systems, the reflectance and absorbance properties of the iris tissue can be exploited to enhance recognition performance. Furthermore, the impact of eye color on iris matching performance can be determined. …


Model-Based Risk Assessment, Walid M. Abdelmoez Dec 2006

Model-Based Risk Assessment, Walid M. Abdelmoez

Graduate Theses, Dissertations, and Problem Reports

In this research effort, we focus on model-based risk assessment. Risk assessment is essential in any plan intended to manage software development or maintenance process. Subjective techniques are human intensive and error-prone. Risk assessment should be based on architectural attributes that we can quantitatively measure using architectural level metrics. Software architectures are emerging as an important concept in the study and practice of software engineering nowadays, due to their emphasis on large-scale composition of software product, and to their support for emerging software engineering paradigms, such as product line engineering, component based software engineering, and software evolution.;In this dissertation, we …


A Methodology For Software Performance Modeling And Its Application To A Border Inspection System, Paola Bracchi Dec 2006

A Methodology For Software Performance Modeling And Its Application To A Border Inspection System, Paola Bracchi

Graduate Theses, Dissertations, and Problem Reports

It is essential that software systems meet their performance objectives. Many factors affect software performance and it is fundamental to identify those factors and the magnitude of their effects early in the software lifecycle to avoid costly and extensive changes to software design, implementation, or requirements. In the last decade the development of techniques and methodologies to carry out performance analysis in the early stages of the software lifecycle has gained a lot of attention within the research community. Different approaches to evaluate software performance have been developed. Each of them is characterized by a certain software specification and performance …


Properties Of Some Matrix Classes In Linear Complementarity Theory., Arup Kumar Das Dr. Nov 2006

Properties Of Some Matrix Classes In Linear Complementarity Theory., Arup Kumar Das Dr.

Doctoral Theses

The linear complementarity problem is a fundamental problem that arises in optimization, game theory, economics, and engineering. It can be stated as follows:Given a square matrix A of order n with real entries and an n dimensional vector q, find n dimensional vectors w and z satisfying w − Az = q, w ≥ 0, z ≥ 0 (1.1.1) w t z = 0. (1.1.2)This problem is denoted as LCP(q, A). The name comes from the condition (1.1.2), the complementarity condition which requires that at least one variable in the pair (wj , zj ) should be equal to 0 …


Modeling Heterogeneous User Churn And Local Resilience Of Unstructured P2p Networks, Zhongmei Yao, Derek Leonard, Dmitri Loguinov, Xiaoming Wang Nov 2006

Modeling Heterogeneous User Churn And Local Resilience Of Unstructured P2p Networks, Zhongmei Yao, Derek Leonard, Dmitri Loguinov, Xiaoming Wang

Computer Science Faculty Publications

Previous analytical results on the resilience of unstructured P2P systems have not explicitly modeled heterogeneity of user churn (i.e., difference in online behavior) or the impact of in-degree on system resilience. To overcome these limitations, we introduce a generic model of heterogeneous user churn, derive the distribution of the various metrics observed in prior experimental studies (e.g., lifetime distribution of joining users, joint distribution of session time of alive peers, and residual lifetime of a randomly selected user), derive several closed-form results on the transient behavior of in-degree, and eventually obtain the joint in/out degree isolation probability as a simple …


Machine Vision Applications In Uavs For Autonomous Aerial Refueling And Runway Detection, Larry W. Rowe Ii Aug 2006

Machine Vision Applications In Uavs For Autonomous Aerial Refueling And Runway Detection, Larry W. Rowe Ii

Graduate Theses, Dissertations, and Problem Reports

This research focuses on the application of Machine Vision (MV) techniques and algorithms to the problems of Autonomous Aerial Refueling (AAR) and Runway Detection. In particular, real laboratory based hardware was used in a simulated environment to emulate real-life conditions for AAR. It was shown that the K-Means Clustering Algorithm solution to the Marker Detection problem could be executed at a frame rate of 30 Hz and it averaged a tracking error of less than one pixel while utilizing only 0.16% of the image. It was also shown that the solution to the Runway Detection problem could be executed at …


Evaluation And Performance Prediction Of Multimodal Biometric Systems, Nevena Samoska Aug 2006

Evaluation And Performance Prediction Of Multimodal Biometric Systems, Nevena Samoska

Graduate Theses, Dissertations, and Problem Reports

Multibiometric systems fuse the evidence presented by different biometric sources in order to improve the matching accuracy of a biometric system. In such systems, information fusion can be performed at different levels; however, integration at the matching score level is the most commonly used approach due to the tradeoff between information content and accessibility. This work develops a tool in order to analyze the impact of various normalization schemes on the matching performance of score-level fusion algorithms. The tool permits the systematic evaluation of different fusion rules after employing normalizing and mapping the match scores of different modalities into a …


A Component-Based Approach To Verification And Validation Of Formal Software Models, Dejan Desovski Aug 2006

A Component-Based Approach To Verification And Validation Of Formal Software Models, Dejan Desovski

Graduate Theses, Dissertations, and Problem Reports

Formal methods for verification of software systems often face the problem of state explosion and complexity. We present a divide and conquer methodology that leads to component based verification and analysis of formal requirements specifications expressed using Software Cost Reduction (SCR) models. The proposed methodology has the following steps: model partitioning, partition verification (either by model checking or testing) and composition of verification results.;We define a novel decomposition methodology for SCR specifications based on min-cut graph algorithms. The methodology identifies components in given SCR specifications and automates related abstraction methods. It also provides guidance on how to perform verification and …


Image Up-Sampling Using The Discrete Wavelet Transform, Laleh Asgharian Aug 2006

Image Up-Sampling Using The Discrete Wavelet Transform, Laleh Asgharian

Theses and Dissertations - UTB/UTPA

Image up-sampling is an effective technique, useful in today's digital image processing applications and rendering devices. In image up-sampling, an image is enhanced from a lower resolution to a higher resolution with the degree of enhancement depending upon application requirements. It is known that the traditional interpolation based approaches for up-sampling, such as the Bilinear or Bicubic interpolations, blur the resultant images along edges and image features. Furthermore, in color imagery, these interpolation-based up-sampling methods may have color infringing artifacts in the areas where the images contain sharp edges and fine textures. We present an interesting up-sampling algorithm based on …


Improving Record Linkage Through Pedigrees, Burdette N. Pixton Jul 2006

Improving Record Linkage Through Pedigrees, Burdette N. Pixton

Theses and Dissertations

Record linkage, in a genealogical context, is the process of identifying individuals from multiple sources which refer to the same real-world entity. Current solutions focus on the individuals in question and on complex rules developed by human experts. Genealogical databases are highly-structured with relationships existing between the individuals and other instances. These relationships can be utilized and human involvement greatly minimized by using a filtered structured neural network. These neural networks, using traditional back-propagation methods, are biased in a way to make the network human readable. The results show an increase in precision and recall when pedigree data is available …


Design Of Iteration On Hash Functions And Its Cryptanalysis., Mridul Nandi Dr. May 2006

Design Of Iteration On Hash Functions And Its Cryptanalysis., Mridul Nandi Dr.

Doctoral Theses

No abstract provided.


Scalable Approaches For Supporting Mpi-Io Atomicity, Peter Aarestad, George K. Thiruvathukal, Avery Ching, Alok Choudhary May 2006

Scalable Approaches For Supporting Mpi-Io Atomicity, Peter Aarestad, George K. Thiruvathukal, Avery Ching, Alok Choudhary

Computer Science: Faculty Publications and Other Works

Scalable atomic and parallel access to noncontiguous regions of a file is essential to exploit high performance I/O as required by large-scale applications. Parallel I/O frameworks such as MPI I/O conceptually allow I/O to be defined on regions of a file using derived datatypes. Access to regions of a file can be automatically computed on a perprocessor basis using the datatype, resulting in a list of (offset, length) pairs. We describe three approaches for implementing lock serving (whole file, region locking, and byterange locking) and compare the various approaches using three noncontiguous I/O benchmarks. We present the details of the …


Analysis Of Computer Science Curriculum Through Development Of An Online Crime Reporting System, Linda Kress May 2006

Analysis Of Computer Science Curriculum Through Development Of An Online Crime Reporting System, Linda Kress

Graduate Theses, Dissertations, and Problem Reports

There are inherent differences in appropriate methodologies for developing hardware-oriented and software-oriented projects. Due to a recent change in the curriculum requirements for computer science students, the need to revise the senior design curriculum for students working on software-oriented projects has arisen. With graduate student supervision, a senior design team developed an online crime reporting system. The need for revision was apparent throughout the development process. This paper discusses difficulties encountered by the team and offers solutions to those obstacles, particularly in the areas of scheduling, documentation, development environment, and the security of software applications.


Modeling Operating System Crash Behavior Through Multifractal Analysis, Long Range Dependence And Mining Of Memory Usage Patterns, Vijai Gandikota May 2006

Modeling Operating System Crash Behavior Through Multifractal Analysis, Long Range Dependence And Mining Of Memory Usage Patterns, Vijai Gandikota

Graduate Theses, Dissertations, and Problem Reports

Software Aging is a phenomenon where the state of the operating systems degrades over a period of time due to transient errors. These transient errors can result in resource exhaustion and operating system hangups or crashes.;Three different techniques from fractal geometry are studied using the same datasets for operating system crash modeling and prediction. Holder Exponent is an indicator of how chaotic a signal is. M5 Prime is a nominal classification algorithm that allows prediction of a numerical quantity such as time to crash based on current and previous data. Hurst exponent measures the self similarity and long range dependence …


Web-Based Tool For Software Architecture Metrics, Israr Pasha Shaik May 2006

Web-Based Tool For Software Architecture Metrics, Israr Pasha Shaik

Graduate Theses, Dissertations, and Problem Reports

The study of software architectures is gaining importance due to its role in various aspects of software engineering like product line engineering, component based software engineering and other emerging paradigms. Various architectural attributes including error propagation, change propagation, requirements propagation provide a wealth of information about software architectures.;For the past few years, researchers at West Virginia University and New Jersey Institute of Technology have been working on the project, Software Architectural level metrics. As the result of which, various software metrics have been proposed to analyze and evaluate the design qualities of software architectures. The goal of this research is …


Psd-Project Sequence Database, Matthew Kayala, Akhila Kambhampati, Stephanie Forschner, Bethany D. Jenkins Apr 2006

Psd-Project Sequence Database, Matthew Kayala, Akhila Kambhampati, Stephanie Forschner, Bethany D. Jenkins

Bioinformatics Software Design Projects

1. Introduction

The sequencing of nucleic acids and the subsequent analysis of their encoded the genes and proteins has revolutionized biological sciences and allowed for the determination of evolutionary origins and biochemical potential of organisms. While the technology to determine molecular sequence data has become extremely powerful in terms of both automation and thoughput, sequence analysis technology has lagged behind, unable to efficiently keep up with the vast amount of sequence data being generated both in individual labs and by researchers worldwide. The foundation of robust sequence analysis is dependent on the building and maintaining of project sequence databases (PSD) …


Abstracts Of Papers, 84th Annual Meeting Of The Virginia Academy Of Science Apr 2006

Abstracts Of Papers, 84th Annual Meeting Of The Virginia Academy Of Science

Virginia Journal of Science

Full abstracts of papers for the 84th Annual Meeting of the Virginia Academy of Science, May 25-26, 2006, Virginia Polytechnic Institute and State University, Blacksburg, VA


Studies On Pairing-Based And Constant Round Dynamic Group Key Agreement., Ratna Dutta Dr. Feb 2006

Studies On Pairing-Based And Constant Round Dynamic Group Key Agreement., Ratna Dutta Dr.

Doctoral Theses

This thesis describes research that I conducted during the course of my Ph.D. study at Indian Statistical Institute (ISI), Kolkata. I hope that this work is of use and will be carried on.I would like to begin by thanking my supervisor, Prof. Rana Barua for his support and endless patience. He has provided me background in Cryptography, Combinatorics and Theory of Automata during the period 2000-2002 of my course work of M.Tech in Computer Science at Indian Statistical Institute. I really appreciate his extraordinary patience in reading my numerous inferior drafts, for listening and analyzing all my ideas, forcing me …


Automatic Solar Feature Detection Using Image Processing And Pattern Recognition Techniques, Ming Qu Jan 2006

Automatic Solar Feature Detection Using Image Processing And Pattern Recognition Techniques, Ming Qu

Dissertations

The objective of the research in this dissertation is to develop a software system to automatically detect and characterize solar flares, filaments and Corona Mass Ejections (CMEs), the core of so-called solar activity. These tools will assist us to predict space weather caused by violent solar activity. Image processing and pattern recognition techniques are applied to this system.

For automatic flare detection, the advanced pattern recognition techniques such as Multi-Layer Perceptron (MLP), Radial Basis Function (RBF), and Support Vector Machine (SVM) are used. By tracking the entire process of flares, the motion properties of two-ribbon flares are derived automatically. In …


Internet Reference Sources For Computing And Computer Science: A Selected Guide, Michael Knee Jan 2006

Internet Reference Sources For Computing And Computer Science: A Selected Guide, Michael Knee

University Libraries Faculty Scholarship

Computing and computer science bibliographic databases, bibliographies, dictionaries, encyclopedias, directories, and guides, along with finding aids for technical reports, online books, and book reviews are listed and described. Subscription-based sources as well as free alternatives are covered. Resources are listed for all levels of computing ability including faculty and professionals, graduate students, undergraduates, and general users.


Shape Based Automated Mapping Of Histological Mouse Brain Sections, Manasa Danda Jan 2006

Shape Based Automated Mapping Of Histological Mouse Brain Sections, Manasa Danda

Graduate Theses, Dissertations, and Problem Reports

In the development of an automatic image mapping system for mouse brain images, we focus on obtaining the best match in the two dimensional atlas images for the query image of a mouse brain section. The matching issue has to deal with the tissue distortions and tears, which are routinely encountered and possible scale, rotation and shear changes. With the goal to achieve high performance for image matching, a dual-stage approach is proposed which is based on radial distributions and region-based template matching.;Our main challenge is identifying shape features and corresponding distance metrics that produce effective characterization of 2D sections …


The Hydra Filesystem: A Distrbuted Storage Famework, Benjamin Gonzalez, George K. Thiruvathukal Jan 2006

The Hydra Filesystem: A Distrbuted Storage Famework, Benjamin Gonzalez, George K. Thiruvathukal

Computer Science: Faculty Publications and Other Works

Hydra File System (HFS) is an experimental framework for constructing parallel and distributed filesystems. While parallel and distributed applications requiring scalable and flexible access to storage and retrieval are becoming more commonplace, parallel and distributed filesystems remain difficult to deploy easily and configure for different needs. HFS aims to be different by being true to the tradition of high-performance computing while employing modern design patterns to allow various policies to be configured on a per instance basis (e.g. storage, communication, security, and indexing schemes). We describe a working prototype (available for public download) that has been implemented in the Python …


Journey To The Center Of The Core: Computers And The Internet In The Core Curriculum, Jorge Pérez, Meg C. Murray Jan 2006

Journey To The Center Of The Core: Computers And The Internet In The Core Curriculum, Jorge Pérez, Meg C. Murray

Faculty and Research Publications

Computers, digitalization and the Internet have transformed modern society. Commerce, education, communication and socialization will never be the same. Surprisingly, many universities do not require a computing course in the core curriculum. Critical information technology (IT) competencies are often taken for granted, to the detriment of students who lack computing and Internet skills. This paper describes an initiative undertaken by a computer science and information systems department to assess and remediate IT skills needed by all university students, regardless of major. The project is evolving along several dimensions: identification of discipline-independent IT competencies, assessment of IT skills among current and …


Empirical Analysis Of Software Reliability, Margaret L. Hamill Jan 2006

Empirical Analysis Of Software Reliability, Margaret L. Hamill

Graduate Theses, Dissertations, and Problem Reports

This thesis presents an empirical study of architecture-based software reliability based on large real case studies. It undoubtedly demonstrates the value of using open source software to empirically study software reliability. The major goal is to empirically analyze the applicability, adequacy and accuracy of architecture-based software reliability models. In both our studies we found evidence that the number of failures due to faults in more than one component is not insignificant. Consequently, existing models that make such simplifying assumptions must be improved to account for this phenomenon. This thesis' contributions include developing automatic methods for efficient extraction of necessary data …


Web Workload Analysis And Session Characterization Using Clustering, Deepak Jha Jan 2006

Web Workload Analysis And Session Characterization Using Clustering, Deepak Jha

Graduate Theses, Dissertations, and Problem Reports

Web servers have a significant presence in today's Internet. Corporations want to achieve high availability, scalability, and consistent performance for respective Web systems, maintaining high customer service standards. Web Workload characterization and the analysis of Web log files are the basis on which Web server modeling for efficiency, scalability and availability can be planned. This thesis analyzes the Web access logs of six public Web sites: Department of Computer Science and Electrical Engineering at West Virginia University, West Virginia University, three NASA IVV servers, and Clarknet server. In addition, three private NASA IVV servers are also analyzed.;We characterize sessions using …


Rhode Island College Mobile Course Catalog, Lianne Elsner Jan 2006

Rhode Island College Mobile Course Catalog, Lianne Elsner

Honors Projects

Consists of a suite of computer programs written in Visual Basic.net and embedded Visual Basic 3.0, whose purpose is to display the RIC course catalog on a Pocket PC device running Windows Mobile. The program package allows major course requirements and information to be viewed on a single screen. Included is a desktop computer program which allows faculty and staff to make changes to the database of courses.


Performance Measurements Of Web Services, Sarita Damaraju Jan 2006

Performance Measurements Of Web Services, Sarita Damaraju

Graduate Theses, Dissertations, and Problem Reports

Web services are rapidly evolving application-integration technologies that allow applications in heterogeneous environments to communicate with each other. In this thesis we perform a measurements-based study of an e-commerce application that uses web services to execute business operations. We use the TPC-W specification to generate a session-based workload. The component level response times and the hardware resource usage on the different machines are measured. The component level response times are extracted from the application server logs. From the results it is seen that as the workload increases the response times of the web services components increase. From the hardware resource …


Long-Term Bandwidth Estimation, Brian E. Masney Jan 2006

Long-Term Bandwidth Estimation, Brian E. Masney

Graduate Theses, Dissertations, and Problem Reports

Computer networks are connected with other networks using one or more dedicated circuits. These dedicated circuits have a finite amount of available bandwidth to transport the data. There is a need to predict the future utilization of these circuits so that additional capacity can be added before the circuit becomes saturated. Once the circuit becomes saturated, network packets will be discarded resulting in a poor end-user experience. It typically takes several weeks or, in some cases, several months for an order of additional capacity to be installed. A network planner should, therefore, know in advance when additional capacity will be …


A Translator For Automated Code Generation For Service-Based Systems, Sanjib (Sean) Banerjee Jan 2006

A Translator For Automated Code Generation For Service-Based Systems, Sanjib (Sean) Banerjee

Graduate Theses, Dissertations, and Problem Reports

Service based systems are playing a major role in industry today, everything from the verification of credit cards to booking airplane reservations are using some form of a service based approach. This unfortunately brings up a really big problem, how do we know that these services are actually doing what they are supposed to? Or, how do we know the service based system doesn't get somehow compromised when handling sensitive information.;A collaborative project involving Arizona State University and West Virginia University began in 2004 to first create a language, called alpha-calculus. We can prove that the code written in alpha-calculus …