Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

2010

Institution
Keyword
Publication
Publication Type
File Type

Articles 361 - 371 of 371

Full-Text Articles in Computer Engineering

Crctol: A Semantic Based Domain Ontology Learning System, Xing Jiang, Ah-Hwee Tan Jan 2010

Crctol: A Semantic Based Domain Ontology Learning System, Xing Jiang, Ah-Hwee Tan

Research Collection School Of Computing and Information Systems

Domain ontologies play an important role in supporting knowledge‐based applications in the Semantic Web. To facilitate the building of ontologies, text mining techniques have been used to perform ontology learning from texts. However, traditional systems employ shallow natural language processing techniques and focus only on concept and taxonomic relation extraction. In this paper we present a system, known as Concept‐Relation‐Concept Tuple‐based Ontology Learning (CRCTOL), for mining ontologies automatically from domain‐specific documents. Specifically, CRCTOL adopts a full text parsing technique and employs a combination of statistical and lexico‐syntactic methods, including a statistical algorithm that extracts key concepts from a document collection, …


On Coalgebras Over Algebras, Adriana Balan, Alexander Kurz Jan 2010

On Coalgebras Over Algebras, Adriana Balan, Alexander Kurz

Engineering Faculty Articles and Research

We extend Barr’s well-known characterization of the final coalgebra of a Set-endofunctor as the completion of its initial algebra to the Eilenberg-Moore category of algebras for a Set-monad M for functors arising as liftings. As an application we introduce the notion of commuting pair of endofunctors with respect to the monad M and show that under reasonable assumptions, the final coalgebra of one of the endofunctors involved can be obtained as the free algebra generated by the initial algebra of the other endofunctor.


Families Of Symmetries As Efficient Models Of Resource Binding, Vincenzo Ciancia, Alexander Kurz, Ugo Montanari Jan 2010

Families Of Symmetries As Efficient Models Of Resource Binding, Vincenzo Ciancia, Alexander Kurz, Ugo Montanari

Engineering Faculty Articles and Research

Calculi that feature resource-allocating constructs (e.g. the pi-calculus or the fusion calculus) require special kinds of models. The best-known ones are presheaves and nominal sets. But named sets have the advantage of being finite in a wide range of cases where the other two are infinite. The three models are equivalent. Finiteness of named sets is strictly related to the notion of finite support in nominal sets and the corresponding presheaves. We show that named sets are generalisd by the categorical model of families, that is, free coproduct completions, indexed by symmetries, and explain how locality of interfaces gives good …


Transmitter Optimization In Multiuser Wireless Systems With Quality Of Service Constraints, Danda B. Rawat Jan 2010

Transmitter Optimization In Multiuser Wireless Systems With Quality Of Service Constraints, Danda B. Rawat

Electrical & Computer Engineering Theses & Dissertations

In this dissertation, transmitter adaptation for optimal resource allocation in wireless communication systems are investigated. First, a multiple access channel model is considered where many transmitters communicate with a single receiver. This scenario is a basic component of a. wireless network in which multiple users simultaneously access the resources of a wireless service provider. Adaptive algorithms for transmitter optimization to meet Quality-of-Service (QoS) requirements in a distributed manner are studied. Second, an interference channel model is considered where multiple interfering transmitter-receiver pairs co-exist such that a given transmitter communicates with its intended receiver in the presence of interference from other …


Privacy-Preserving Attribute-Based Access Control In A Grid, Sang Mork Park Jan 2010

Privacy-Preserving Attribute-Based Access Control In A Grid, Sang Mork Park

Browse all Theses and Dissertations

A Grid community is composed of diverse stake holders, such as data resource providers, computing resource providers, service providers, and the users of the resources and services. In traditional security systems for Grids, most of the authentication and authorization mechanisms are based on the user's identity or the user's classification information. If the authorization mechanism is based on the user's identity, fine-grained access control policies can be implemented but the scalability of the security system would be limited. If the authorization mechanism is based on the user's classification, the scalability can be improved but the fine-grained access control policies may …


Prognosis: A Wearable System For Health Monitoring Of People At Risk, Alexandros A. Pantelopoulos Jan 2010

Prognosis: A Wearable System For Health Monitoring Of People At Risk, Alexandros A. Pantelopoulos

Browse all Theses and Dissertations

Wearable Health Monitoring Systems (WHMS) have drawn a lot of attention from the research community and the industry during the last decade. The development of such systems has been motivated mainly by increasing healthcare costs and by the fact that the world population is ageing. In addition to that, RandD in WHMS has been propelled by recent technological advances in miniature bio-sensing devices, smart textiles, microelectronics and wireless communications techniques. These portable health systems can comprise various types of small physiological sensors, which enable continuous monitoring of a variety of human vital signs and other physiological parameters such as heart …


Evolution And Analysis Of Neuromorphic Flapping-Wing Flight Controllers, Sanjay Kumar Boddhu Jan 2010

Evolution And Analysis Of Neuromorphic Flapping-Wing Flight Controllers, Sanjay Kumar Boddhu

Browse all Theses and Dissertations

The control of insect-sized flapping-wing micro air vehicles is attracting increasing interest. Solution of the problem requires construction of a controller that is physically small, extremely power efficient, and capable. In addition, process variation in the creation of very small wings and armatures as well as the potential for accumulating damage and wear over the course of a vehicle's lifetime suggest that controllers be able to self-adapt to the specific and possibly changing nature of the vehicles in which they are embedded. Previous work with Evolvable Hardware Continuous Time Recurrent Neural Networks (CTRNNs) as applied to adaptive control of walking …


A Novel Synergistic Diagnosis Methodology For Identifying Abnormalities In Wireless Capsule Endoscopy Videos, Alexandros Karargyris Jan 2010

A Novel Synergistic Diagnosis Methodology For Identifying Abnormalities In Wireless Capsule Endoscopy Videos, Alexandros Karargyris

Browse all Theses and Dissertations

Wireless Capsule Endoscopy (WCE) is a new technology that allows medical personnel to view the gastrointestinal (GI) mucosa. It is a swallowable miniature capsule device the size of a pill that transmits thousands of screenshots of the digestive tract to a wearable receiver. When the procedure finishes the video is uploaded to a workstation for viewing. Capsule Endoscopy has been established as a tool to identify various gastrointestinal (GI) conditions, such as blood-based abnormalities, polyps, ulcers, Crohn's disease in the small intestine, where the classical endoscopy is not regularly used.

As of 2009 the market is dominated by Given Imaging …


Semantic Provenance: Modeling, Querying, And Application In Scientific Discovery, Satya Sanket Sahoo Jan 2010

Semantic Provenance: Modeling, Querying, And Application In Scientific Discovery, Satya Sanket Sahoo

Browse all Theses and Dissertations

Provenance metadata, describing the history or lineage of an entity, is essential for ensuring data quality, correctness of process execution, and computing trust values. Traditionally, provenance management issues have been dealt with in the context of workflow or relational database systems. However, existing provenance systems are inadequate to address the requirements of an emerging set of applications in the new eScience or Cyberinfrastructure paradigm and the Semantic Web. Provenance in these applications incorporates complex domain semantics on a large scale with a variety of uses, including accurate interpretation by software agents, trustworthy data integration, reproducibility, attribution for commercial or legal …


Understanding User-Generated Content On Social Media, Bala Meenakshi Nagarajan Jan 2010

Understanding User-Generated Content On Social Media, Bala Meenakshi Nagarajan

Browse all Theses and Dissertations

Over the last few years, there has been a growing public and enterprise fascination with 'social media' and its role in modern society. At the heart of this fascination is the ability for users to participate, collaborate, consume, create and share content via a variety of platforms such as blogs, micro-blogs, email, instant messaging services, social network services, collaborative wikis, social bookmarking sites, and multimedia sharing sites.

This dissertation is devoted to understanding informal user-generated textual content on social media platforms and using the results of the analysis to build Social Intelligence Applications.

The body of research presented in this …


Embedded Systems As Datacenters, Robert Iannucci Dec 2009

Embedded Systems As Datacenters, Robert Iannucci

Robert A Iannucci

No abstract provided.