Open Access. Powered by Scholars. Published by Universities.®

Arts and Humanities Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

2010

Institution
Keyword
Publication
Publication Type
File Type

Articles 1 - 27 of 27

Full-Text Articles in Arts and Humanities

Morphogrammatics Of Reflection, Rudolf Kaehr Nov 2010

Morphogrammatics Of Reflection, Rudolf Kaehr

Rudolf Kaehr

Turning back from the studies of morphogrammatics to some open questions of reflectional programming, the recountered problematics might be put into a different light and new methods of handling formal aspects of reflection and reflectionality shall be introduced. Albeit the use of light-metaphors, morphogrammatic reflection is not sketched along the paradigm of optical metaphors. Morphograms are presenting neither propositions nor perceptions able for mirroring (representation). Exercises in defining morphogrammatic retro-grade recursion and reflection schemata are continued from the paper “Sketches to Morphogrammatic Programming”.


Distributed Web Design, Christy Allen Sep 2010

Distributed Web Design, Christy Allen

Christy Allen

No abstract provided.


Architecture And Compiler Support For Leakage Reduction Using Power Gating In Microprocessors, Soumyaroop Roy Aug 2010

Architecture And Compiler Support For Leakage Reduction Using Power Gating In Microprocessors, Soumyaroop Roy

USF Tampa Graduate Theses and Dissertations

Power gating is a technique commonly used for runtime leakage reduction in digital CMOS circuits. In microprocessors, power gating can be implemented by using sleep transistors to selectively deactivate circuit modules when they are idle during program execution. In this dissertation, a framework for power gating arithmetic functional units in embedded microprocessors with architecture and compiler support is proposed. During compile time, program regions are identified where one or more functional units are idle and sleep instructions are inserted into the code so that those units can be put to sleep during program execution. Subsequently, when their need is detected …


Emergent Design Dissertation Errata, Kent D. Palmer Aug 2010

Emergent Design Dissertation Errata, Kent D. Palmer

Kent D. Palmer

Errors found in final dissertation


Composing Music In Constrained Search Environments, Jeffrey Keene Aug 2010

Composing Music In Constrained Search Environments, Jeffrey Keene

Electronic Theses and Dissertations

Composing music with computers in constrained search environments adds complexities and problems not present in the traditional problem domain of generative music. The traditional and well researched mechanisms of Markov chains, genetic algorithms and data driven rule based systems do not directly map to a problem domain in which pitch choice and rhythm choice are likely to be highly limited.

We therefore explore several possible solutions to generating rhythms in extremely constrained environments with the goal of generating music that adheres to user specified constraints and is aesthetically pleasing.


A Call To Is Educators To Respond To The Voices Of Women In Information Security, Amy B. Woszczynski, Sherri Shade Jul 2010

A Call To Is Educators To Respond To The Voices Of Women In Information Security, Amy B. Woszczynski, Sherri Shade

Faculty and Research Publications

Much prior research has examined the dearth of women in the IT industry. The purpose of this study is to examine the perceptions of women in IT within the context of information security and assurance. This paper describes results from a study of a relatively new career path to see if there are female-friendly opportunities that have not existed in previous IT career paths. Research methodology focuses on a qualitative analysis of in-depth interviews with women who are self-described information security professionals. A primary goal of the study is to understand the perceptions of women in information security and determine …


Exploring The Strategic Alignment Of Performing Arts And Computing: Creating And Delivering Multimedia Performing Arts Content, Linda Calloway, Robert Meffe Jun 2010

Exploring The Strategic Alignment Of Performing Arts And Computing: Creating And Delivering Multimedia Performing Arts Content, Linda Calloway, Robert Meffe

Cornerstone 3 Reports : Interdisciplinary Informatics

No abstract provided.


Memristics: Memristors, Again? – Part Ii, How To Transform Wired ‘Translations’ Between Crossbars Into Interactions?, Rudolf Kaehr Apr 2010

Memristics: Memristors, Again? – Part Ii, How To Transform Wired ‘Translations’ Between Crossbars Into Interactions?, Rudolf Kaehr

Rudolf Kaehr

The idea behind this patchwork of conceptual interventions is to show the possibility of a “buffer-free” modeling of the crossbar architecture for memristive systems on the base of a purely difference-theoretical approach. It is considered that on a nano-electronic level principles of interpretation appears as mechanisms of complementarity. The most basic conceptual approach to such a complementarity is introduced as an interchangeability of operators and operands of an operation. Therefore, the architecture of crossbars gets an interpretation as complementarity between crossbar functionality and “buffering” translation functionality. That is, the same matter functions as operator and at once, as operand – …


Memristics: Memristors, Again?, Rudolf Kaehr Apr 2010

Memristics: Memristors, Again?, Rudolf Kaehr

Rudolf Kaehr

This collection gives first and short critical reflections on the concepts of memristics, memristors and memristive systems and the history of similar movements with an own focus on a possible interplay between memory and computing functions, at once, at the same place and time, to achieve a new kind of complementarity between computation and memory on a single chip without retarding buffering conditions.


Volume 03, Cheryl Peck, Charles Hoever, Longwood Theater Department, Brittany Anderson, J. Ervin Sheldon, Richard Hayden, Yuri Calustro, Candice Fleming, Rebecca Franklin, Ashley Yocum, Danielle M. Jagoda, Cristina M. Valdivieso, Jameka Jones, Amy Ellis, Ashley Maser, Erikk Shupp, Jamie Yurasits, Joshua Davis, Alexander Leonhart, Kenny Wolfe, Sally Meadows, J. Haley, Amy Jackson, Morgan Howard, Adrienne Heinbaugh, Melissa Dorton, Ciarra Stalker Apr 2010

Volume 03, Cheryl Peck, Charles Hoever, Longwood Theater Department, Brittany Anderson, J. Ervin Sheldon, Richard Hayden, Yuri Calustro, Candice Fleming, Rebecca Franklin, Ashley Yocum, Danielle M. Jagoda, Cristina M. Valdivieso, Jameka Jones, Amy Ellis, Ashley Maser, Erikk Shupp, Jamie Yurasits, Joshua Davis, Alexander Leonhart, Kenny Wolfe, Sally Meadows, J. Haley, Amy Jackson, Morgan Howard, Adrienne Heinbaugh, Melissa Dorton, Ciarra Stalker

Incite: The Journal of Undergraduate Scholarship

Introduction from Dean Dr. Charles Ross

Little Shop of Horrors by Longwood Theater Department

Who Has the Hottest Hotsauce in Farmville: A Quantitative Comparison of Sauces from Local Restaurants by Cheryl Peck and Charles Hoever

Precipitation Effects on the Growth of White Oaks and Virginia Pines on the Mt. Vernon Plantation by Brittany Anderson

Design and Synthesis of Novel Ion Binding Molecules for Self-Assembly and Sensing Applications by J. Ervin Sheldon

A Statistical Analysis of Algorithms for Playing SameGame by Richard Hayden

Intersecting Cylinders at Arbitrary Angles by Yuri Calustro

Putting a Foot in the Revolving Door: Strategies for Reducing …


Cold War Origins Of The International Federation For Information Processing, Ksenia Tatarchenko Apr 2010

Cold War Origins Of The International Federation For Information Processing, Ksenia Tatarchenko

Research Collection College of Integrative Studies

The International Federation for Information Processing (IFIP) was born as a nongovernmental federation with the main goal of bringing together computer professionals from countries in the East and West. This article examines the Cold War context of the IFIP's origins and the mechanisms its founders used to reconcile computing and politics and to construct computing as an international discipline.


Artificial Intelligence: Soon To Be The World’S Greatest Intelligence, Or Just A Wild Dream?, Edward R. Kollett Mar 2010

Artificial Intelligence: Soon To Be The World’S Greatest Intelligence, Or Just A Wild Dream?, Edward R. Kollett

Academic Symposium of Undergraduate Scholarship

The purpose of the paper was to examine the field of artificial intelligence. In particular, the paper focused on what has been accomplished towards the goal of making a machine that can think like a human, and the hardships that researchers in the field has faced. It also touched upon the potential outcomes of success. Why is this paper important? As computers become more powerful, the common conception is that they are becoming more intelligent. As computers become more integrated with society and more connected with each other, people again believe they are becoming smarter. Therefore, it is important that …


No Surprise People Ignore Copyright, Rebecca Giblin Feb 2010

No Surprise People Ignore Copyright, Rebecca Giblin

Dr Rebecca Giblin

No abstract provided.


Quantification Of Artistic Style Through Sparse Coding Analysis In The Drawings Of Pieter Bruegel The Elder, James M. Hughes, Daniel J. Graham, Daniel N. Rockmore Jan 2010

Quantification Of Artistic Style Through Sparse Coding Analysis In The Drawings Of Pieter Bruegel The Elder, James M. Hughes, Daniel J. Graham, Daniel N. Rockmore

Dartmouth Scholarship

Recently, statistical techniques have been used to assist art historians in the analysis of works of art. We present a novel technique for the quantification of artistic style that utilizes a sparse coding model. Originally developed in vision research, sparse coding models can be trained to represent any image space by maximizing the kurtosis of a representation of an arbitrarily selected image from that space. We apply such an analysis to successfully distinguish a set of authentic drawings by Pieter Bruegel the Elder from another set of well-known Bruegel imitations. We show that our approach, which involves a direct comparison …


Arabic For Designers By Mourad Boutros, Saad D. Abulhab Jan 2010

Arabic For Designers By Mourad Boutros, Saad D. Abulhab

Publications and Research

No abstract provided.


Sketch Of A Typology Of Abstract Memristic Machines, Rudolf Kaehr Jan 2010

Sketch Of A Typology Of Abstract Memristic Machines, Rudolf Kaehr

Rudolf Kaehr

A typology of memristic machines is sketched. This sketch gives an overview and orientation to the paper “Towards Abstract Memristic Machines”. It also intents to propose a concise systematization of the newly introduced terms and strategies to memristics and morphogrammatics. This sketch is introducing four types of sign-use for four types of machines of fundamentally different paradigms: 1. semiotic, 2. monomorphic, 3. polymorphic and 4. bisimilar abstract machines. Further definitions of abstract machines have to be based on those graphematic notational systems. A realization of such constructions of abstract machines, in contrast to existing abstract machines of the theory of …


Towards Abstract Memristic Machines, Rudolf Kaehr Jan 2010

Towards Abstract Memristic Machines, Rudolf Kaehr

Rudolf Kaehr

No abstract provided.


From Universe To Polyverses, Rudolf Kaehr Jan 2010

From Universe To Polyverses, Rudolf Kaehr

Rudolf Kaehr

Some thoughts about the power of speculation behind important discoveries in mathematics, physics and computer science. The exercise shows that there is no need for a compulsory ultimate unifying universe. It is speculated that just this paradigm of a single ultimate universe is unmasking itself today as the main obstacle for further development in Western science and technology.


Morphogrammatics For Dummies: The Domino Approach, Rudolf Kaehr Jan 2010

Morphogrammatics For Dummies: The Domino Approach, Rudolf Kaehr

Rudolf Kaehr

Dominoes, morphograms, cellular automata, memristics. Topics: possible continuation, coalitions, cooperations, substitution, morphic bisimilarity.


An Investigation Of Speech Enhancement Using Wavelet Filtering Method, International Journal Of Speech Technology, Philadelphia University Jan 2010

An Investigation Of Speech Enhancement Using Wavelet Filtering Method, International Journal Of Speech Technology, Philadelphia University

Philadelphia University, Jordan

No abstract provided.


Jordanian Commercial Bank Strategies In High- Rate Of Return Realization And Its Relation With Liquidity Gap Management Performance, Philadelphia University Jan 2010

Jordanian Commercial Bank Strategies In High- Rate Of Return Realization And Its Relation With Liquidity Gap Management Performance, Philadelphia University

Philadelphia University, Jordan

No abstract provided.


Testing Lyoequivalency For Three Commercially Sustainedrelease Tablets Containing Diltiazem Hydrochloride, Philadelphia University Jan 2010

Testing Lyoequivalency For Three Commercially Sustainedrelease Tablets Containing Diltiazem Hydrochloride, Philadelphia University

Philadelphia University, Jordan

No abstract provided.


The Novel And The Experimentation, Philadelphia University Jan 2010

The Novel And The Experimentation, Philadelphia University

Philadelphia University, Jordan

No abstract provided.


Neural-Network-Based Fuzzy Identifier: Design And Evaluation, Philadelphia University Jan 2010

Neural-Network-Based Fuzzy Identifier: Design And Evaluation, Philadelphia University

Philadelphia University, Jordan

No abstract provided.


Using Database Marketing To Enhance Direct Marketing Alternatives In Jordanian Industrial Shareholders Corporations, Philadelphia University Jan 2010

Using Database Marketing To Enhance Direct Marketing Alternatives In Jordanian Industrial Shareholders Corporations, Philadelphia University

Philadelphia University, Jordan

No abstract provided.


A Location Aware P2p Voice Communication Protocol For Networked Virtual Environments, Gabor Papp Jan 2010

A Location Aware P2p Voice Communication Protocol For Networked Virtual Environments, Gabor Papp

Electronic Theses and Dissertations

Multiparty voice communication, where multiple people can communicate in a group, is an important component of networked virtual environments (NVEs), especially in many types of online games. While most research has been conducted on one-to-one communication, we focus on group communication. In this dissertation, we present the first measurement study on the characteristics of multiparty voice communications and develop a model of the talking and silence periods observed during multiparty communication. Over a total of 5 months, we measured over 11,000 sessions on an active multi-party voice communication server to quantify the characteristics of communication generated by game players, including …


Reallocation Of Mesh Points In Fluid Problems Using Back-Propagation Algorithm, Philadelphia University Dec 2009

Reallocation Of Mesh Points In Fluid Problems Using Back-Propagation Algorithm, Philadelphia University

Philadelphia University, Jordan

No abstract provided.