Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 16 of 16

Full-Text Articles in Computer Engineering

Pinpoint: Efficient And Effective Resource Isolation For Mobile Security And Privacy, Paul Ratazzi, Ashok Bommisetti, Nian Ji, Wenliang Du May 2015

Pinpoint: Efficient And Effective Resource Isolation For Mobile Security And Privacy, Paul Ratazzi, Ashok Bommisetti, Nian Ji, Wenliang Du

Electrical Engineering and Computer Science - All Scholarship

Virtualization is frequently used to isolate untrusted processes and control their access to sensitive resources. However, isolation usually carries a price in terms of less resource sharing and reduced inter-process communication. In an open architecture such as Android, this price and its impact on performance, usability, and transparency must be carefully considered. Although previous efforts in developing general-purpose isolation solutions have shown that some of these negative sideeffects can be mitigated, doing so involves overcoming significant design challenges by incorporating numerous additional platform complexities not directly related to improved security. Thus, the general purpose solutions become inefficient and burdensome if …


Reputation Computation In Social Networks And Its Applications, Jooyoung Lee Aug 2014

Reputation Computation In Social Networks And Its Applications, Jooyoung Lee

Dissertations - ALL

This thesis focuses on a quantification of reputation and presents models which compute reputation within networked environments. Reputation manifests past behaviors of users and helps others to predict behaviors of users and therefore reduce risks in future interactions. There are two approaches in computing reputation on networks- namely, the macro-level approach and the micro-level approach. A macro-level assumes that there exists a computing entity outside of a given network who can observe the entire network including degree distributions and relationships among nodes. In a micro-level approach, the entity is one of the nodes in a network and therefore can only …


Flexible Tuning Software: Beyond Equal Temperament, Erica Sponsler May 2011

Flexible Tuning Software: Beyond Equal Temperament, Erica Sponsler

Honors Capstone Projects - All

The premise of this creative Capstone project was to develop a computer instrument that is capable of tuning itself flexibly in such a way as to not require a tempering of the Western scale, as is necessary for fixedly tuned instruments. The difficulty in creating such a system of tuning arises from the mathematical paradox of the musical harmonic series, which is the sequence of frequencies that sound naturally as overtones over a fundamental pitch. They follow a proportional pattern of 1:2, 2:3, 3:4, etc. These small-integer ratios of frequencies represent the consonant (in-tune) harmonic intervals. When an interval does …


Growndswell Iphone Application Development, Arti Chandok May 2011

Growndswell Iphone Application Development, Arti Chandok

Honors Capstone Projects - All

GrowndSwell is a location-based social networking service developed to primarily solve the problem of trying to text several friends in order to convey a simple piece of information: “What are you planning to do today?” This capstone project is focused on developing an iPhone application as a tool for users to convey this information in an efficient and fun manner. The problem requires several tools to capture the market through development of phone applications that are compatible on several platforms and creating an attractive website for brand awareness. This capstone project has focused its attention on the product development of …


Interoperable Credentials Management For Wholesale Banking, Glenn Benson, Shiu-Kai Chin, Sean Croston, Karthick Jayaraman, Susan Older Feb 2011

Interoperable Credentials Management For Wholesale Banking, Glenn Benson, Shiu-Kai Chin, Sean Croston, Karthick Jayaraman, Susan Older

Electrical Engineering and Computer Science - All Scholarship

A gap exists between wholesale-banking business practices and security best practices: wholesale banks operate within the boundaries of contract law, while security best practices often relies upon a benevolent trusted party outside the scope of straightforward contracts. While some business domains may be able to bridge this gap, the ultra-high-value transactions used in business-to-business banking substantially increase the size of the gap. The gap becomes most apparent when regarded from the perspective of interoperability. If a single user applies the same credential to sign high-value transactions at multiple banks, then the trusted-party model becomes overly cumbersome and conflicts with an …


A Clustering Based Discretization For Supervised Learning, Ankit Gupta, Kishan Mehrotra, Chilukuri K. Mohan Nov 2009

A Clustering Based Discretization For Supervised Learning, Ankit Gupta, Kishan Mehrotra, Chilukuri K. Mohan

Electrical Engineering and Computer Science - All Scholarship

We address the problem of discretization of continuous variables for machine learning classification algorithms. Existing procedures do not use interdependence between the variables towards this goal. Our proposed method uses clustering to exploit such interdependence. Numerical results show that this improves the classification performance in almost all cases. Even if an existing algorithm can successfully operate with continuous variables, better performance is obtained if variables are first discretized. An additional advantage of discretization is that it reduces the overall time-complexity.


Using A Pda To Control Home Appliances, Atif Albraiki May 2005

Using A Pda To Control Home Appliances, Atif Albraiki

Honors Capstone Projects - All

The Personal Digital Assistant (PDA) is a handheld device that gives users different organizational capabilities. Over the years, the functionality of PDAs has expanded tremendously to include internet connectivity and different computer applications. The purpose of my honors thesis, combined with my engineering senior design project, was to include a new functionality to the PDA and use it to control different home appliances. The goal of the project was to develop a PDA program that will communicate with a PC program, and have the PC program communicate with a microcontroller to control home appliances. My part of the project was …


Analyst-Focused Arabic Information Retrieval, Robert N. Oddy, Ann R. Diekema, Jean Hannouche, Elizabeth Liddy, Grant Ingersoll Jan 2005

Analyst-Focused Arabic Information Retrieval, Robert N. Oddy, Ann R. Diekema, Jean Hannouche, Elizabeth Liddy, Grant Ingersoll

School of Information Studies - Faculty Scholarship

An English-Arabic Cross-Language Information Retrieval Environment was created in which the analyst can query an Arabic database in English and retrieve a set of relevant Arabic documents. The retrieved Arabic documents are automatically translated into English to facilitate readability by the English-only analyst. Proper names of people, places, and organizations are extracted from the retrieved documents and transliterated from Arabic into English. They are presented to the analyst and serve to provide a brief summarization of the retrieved document search query in English. Cross-Language Information Retrieval (CLIR), itself a desideratum in the ARDA workshop, is a special case of Information …


A Beacon-Less Location Discovery Scheme For Wireless Sensor Networks, Lei Feng, Wenliang Du, Peng Ning Jan 2005

A Beacon-Less Location Discovery Scheme For Wireless Sensor Networks, Lei Feng, Wenliang Du, Peng Ning

Electrical Engineering and Computer Science - All Scholarship

In wireless sensor networks (WSNs), sensor location plays a critical role in many applications. Having a GPS receiver on every sensor node is costly. In the past, a number of location discovery schemes have been proposed. Most of these schemes share a common feature: they use some special nodes, called beacon nodes, which are assumed to know their own locations (e.g., through GPS receivers or manual configuration). Other sensors discover their locations based on the information provided by these beacon nodes. In this paper, we show that efficient location discovery can be achieved in sensor networks without using beacons. We …


Making Svg A Web Service In A Message-Based Mvc Architecture, Xiaohong Qiu, Shrideep Pallickara, Ahmet Uyar Jan 2004

Making Svg A Web Service In A Message-Based Mvc Architecture, Xiaohong Qiu, Shrideep Pallickara, Ahmet Uyar

Electrical Engineering and Computer Science - All Scholarship

We reformulate Scalable Vector Graphics browser in a Web Service architecture separating the rendering from the W3C DOM processing of events. We describe this in a message-based Model-View-Controller (M-MVC) architecture and implement it with a powerful publish-subscribe messaging infrastructure. A Web Services oriented architecture with services loosely coupled by the exchange of messages is becoming an increasingly important feature in the deployment of Internet applications. The broad applicability of this approach includes enterprise software, e-Learning, e-Science and e-Business. Our work provides a general framework for integrating Desktop and Web Service applications. We summarize the performance results from detailed tests of …


A Scalable Durable Grid Event Service, Geoffrey C. Fox, Shrideep Pallickara Jan 2001

A Scalable Durable Grid Event Service, Geoffrey C. Fox, Shrideep Pallickara

Electrical Engineering and Computer Science - All Scholarship

It is interesting to study the system and software architecture of environments, which integrate the evolving ideas of computational grids, distributed objects, web services, peer-to-peer networks and message oriented middleware. Such peer-to-peer (P2P) Grids should seamlessly integrate users to themselves and to resources, which are also linked to each other. We can abstract such environments as a distributed system of "clients" which consist either of "users" or "resources" or proxies thereto. These clients must be linked together in a flexible fault tolerant efficient high performance fashion. In this paper, we study the messaging or event system -- termed GES or …


Discourse-Level Analysis Of Abstracts For Information Retrieval: A Probabilistic Approach, Robert N. Oddy Jul 1992

Discourse-Level Analysis Of Abstracts For Information Retrieval: A Probabilistic Approach, Robert N. Oddy

School of Information Studies - Faculty Scholarship

The objective of this research is to contribute to our knowledge of how people seek information, and how computer systems can be designed to help in this process. Most information retrieval research since the field emerged in the 1950's has reduced these questions to that of trying to determine how documents relevant to a user's query might be selected from a large collection of texts---a question that has proved remarkably difficult to answer. The present work takes the stance that this particular reduction increasingly limits progress towards the objective stated above. It is directed instead towards the development of a …


Towards The Use Of Situational Information In Information Retrieval, Robert N. Oddy, Elizabeth D. Liddy, Ann Bishop, Eileen Martin, Joseph Elewononi, Bhaskaran Balakrishnan Jan 1992

Towards The Use Of Situational Information In Information Retrieval, Robert N. Oddy, Elizabeth D. Liddy, Ann Bishop, Eileen Martin, Joseph Elewononi, Bhaskaran Balakrishnan

School of Information Studies - Faculty Scholarship

This paper is an exploratory study of one approach to incorporating situational information into information retrieval systems, drawing on principles and methods of discourse linguistics. A tenet of discourse linguistics is that texts of a specific type possess a structure above the syntactic level, which follows conventions known to the people using such texts to communicate. In some cases, such as literature describing work done, the structure is closely related to situations, and may therefore be a useful representational vehicle for the present purpose. Abstracts of empirical research papers exhibit a well-defined discourse- level structure, which is revealed by lexical …


Pthomas: An Adaptive Information Retrieval System On The Connection Machine., Robert Oddy, Bhaskaran Balakrishnan Jan 1991

Pthomas: An Adaptive Information Retrieval System On The Connection Machine., Robert Oddy, Bhaskaran Balakrishnan

School of Information Studies - Faculty Scholarship

This paper reports the state of development of PThomas, a network based document retrieval system implemented on a massively parallel fine-grained computer, the Connection Machine. The program is written in C*, an enhancement of the C programming language which exploits the parallelism of the Connection Machine. The system is based on Oddy’s original Thomas program, which was highly parallel in concept, and makes use of the Connection Machine’s single instruction multiple data (SIMD) processing capabilities. After an introduction to systems like Thomas, and their relationship to spreading activation and neural network models, the current state of PThomas is described, including …


Ask For Information Retrieval: Part Ii. Results Of A Design Study, Robert N. Oddy, N J. Belkin, H M. Brooks Sep 1982

Ask For Information Retrieval: Part Ii. Results Of A Design Study, Robert N. Oddy, N J. Belkin, H M. Brooks

School of Information Studies - Faculty Scholarship

In 'ASK for Information Retrieval: Part P1, we discussed the theory and background to a design study for an information retrieval (IR) system based on the attempt to represent the anomalous states of knowledge (ASKs) underlying information needs. In Part 11, we report the methods and results of the design study, and our conclusions.


Ask For Information Retrieval: Part I. Background And Theory, Robert N. Oddy, N J. Belkin, H M. Brooks Jun 1982

Ask For Information Retrieval: Part I. Background And Theory, Robert N. Oddy, N J. Belkin, H M. Brooks

School of Information Studies - Faculty Scholarship

We report the results of a British Library Research and Development Department funded design study for an interactive information retrieval system which will determine structural representations of the anomalous states of knowledge (ASKs) underlying information needs, and attempt to resolve the anomalies through a variety of retrieval strategies performed on a database of documents represented in compatible structural formats. Part I discusses the background to the project and the theory underlying it, Part II (next issue) presents our methods, results and conclusions. Basic premises of the project were: that information needs are not in principle precisely specifiable; that it is …