Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Anti-virus (2)
- Anti-virus design (2)
- Anti-virus development (2)
- Anti-virus software (2)
- Checkpointing (2)
-
- Computer Anti-Virus (2)
- Computer security (2)
- Computer virus (2)
- Computer vulnerability (2)
- Customer Satisfaction (2)
- Inoculation (2)
- Public Service (2)
- Rwanda (2)
- Service Delivery (2)
- Virus detection (2)
- Virus scanning (2)
- Active Learning (1)
- Activity monitoring (1)
- Ant Colony Optimization (ACO) (1)
- Application development (1)
- Behavior monitoring (1)
- Business continuity (1)
- Business strategy (1)
- Capacity-building in Science (1)
- Channel allocation (1)
- Cluster computing (1)
- Cognitive Apprenticeship (1)
- Data Center Resiliency (1)
- Data recovery (1)
- Data structures (1)
- Publication
- File Type
Articles 1 - 21 of 21
Full-Text Articles in Computer Engineering
Adaptive Checkpointing For Master-Worker Style Parallelism (Extended Abstract), Gene D. Cooperman, Jason Ansel, Xiaoqin Ma
Adaptive Checkpointing For Master-Worker Style Parallelism (Extended Abstract), Gene D. Cooperman, Jason Ansel, Xiaoqin Ma
Gene D. Cooperman
No abstract provided.
Dmtcp: Transparent Checkpointing For Cluster Computations And The Desktop, Jason Ansel, Kapil Arya, Gene D. Cooperman
Dmtcp: Transparent Checkpointing For Cluster Computations And The Desktop, Jason Ansel, Kapil Arya, Gene D. Cooperman
Gene D. Cooperman
DMTCP (Distributed MultiThreaded CheckPointing) is a transparent user-level checkpointing package for distributed applications. Checkpointing and restart is demonstrated for a wide range of over 20 well known applications, including MATLAB, Python, TightVNC, MPICH2, OpenMPI, and runCMS. RunCMS runs as a 680 MB image in memory that includes 540 dynamic libraries, and is used for the CMS experiment of the Large Hadron Collider at CERN. DMTCP transparently checkpoints general cluster computations consisting of many nodes, processes, and threads; as well as typical desktop applications. On 128 distributed cores (32 nodes), checkpoint and restart times are typically 2 seconds, with negligible run-time …
Closing The Gap Between The Industry And Higher Education Institutions- Case Examples From East African Region, Deogratias Harorimana Mr
Closing The Gap Between The Industry And Higher Education Institutions- Case Examples From East African Region, Deogratias Harorimana Mr
Dr Deogratias Harorimana
Much complained about is the quality of graduates Universities put on the labour market. Less talked about however is why knowledge institutions seems to be bad knowledge managers. In this presentation I argue that DIRECT collaborative relationship between Industry,Governments and Higher Education Institutions is a per-requisite.Good relationship is key to building such a successful knowledge transfer strategies between Industries and Educational and Research Institutions. This paper explores what makes a good Knowledge Transfer Partnership Strategy and highlights some key lessons for businesses, Universities and Government bodies. This paper was a Key note presentation to the Annual International Conference on Building …
Software Engineering Issues For Mobile Application Development, Tony Wasserman
Software Engineering Issues For Mobile Application Development, Tony Wasserman
Tony Wasserman
This paper provides an overview of important software engineering research issues related to the development of applications that run on mobile devices. Among the topics are development processes, tools, user interface design, application portability, quality, and security.
The Role Of Knowledge Management In The Strategic Alignment Of Information Technology With Business: An Alternative And Complementary View, Fernando Paulo Belfo
The Role Of Knowledge Management In The Strategic Alignment Of Information Technology With Business: An Alternative And Complementary View, Fernando Paulo Belfo
Fernando Paulo Belfo
The Information Technology (IT) team knowledge of business strategy and the organization team knowledge of information technology are critical factors in the strategic business and IT alignment (BIA). These two factors have in common precisely the importance of "knowledge". The Information Technology team lack of knowledge about business and its strategy and vice-versa should be a major concern for the organization, since this knowledge strongly affects the possibility of an appropriate strategic alignment between business and the IT. It is significantly important to create an enabling environment for the growth of shared knowledge of the business area, encouraging professional IT …
An Introduction To Virus Scanners, Umakant Mishra
An Introduction To Virus Scanners, Umakant Mishra
Umakant Mishra
The main functions of an anti-virus program are, (i) Virus prevention and file protection, (ii) Virus scanning and detection, (iii) Removing virus from infected files, and (iv) Recovering damaged files and objects.
An anti-virus program employs various methods to detect and remove viruses. The two popular methods of detecting viruses are signature scanning and behavior monitoring. However each of these methods has its strengths and weaknesses.
As the detection gets more sophisticated so are the virus programmers. The virus programmers also try to go one step beyond the anti-virus mechanism and create intelligent viruses which pose more and more difficult …
Methods Of Virus Detection And Their Limitations, Umakant Mishra
Methods Of Virus Detection And Their Limitations, Umakant Mishra
Umakant Mishra
An anti-virus program typically employs various strategies to detect and remove viruses. The popular methods of detecting virus are signature scanning, heuristic scanning and integrity checking. However each of these methods has its own strengths and weaknesses.
Signature scanning (or searching of known virus patterns) is the most common method of virus detection. But it cannot detect viruses whose signatures are not available in the virus database. The other popular method is to use a heuristic algorithm to find viruses based on common behaviors. This method can be complex, but it has the ability to detect unknown or new viruses. …
Comparing Discrete Simulation And System Dynamics: Modeling An Anti-Insurgency Influence Operation, Wayne W. Wakeland, Una E. Medina
Comparing Discrete Simulation And System Dynamics: Modeling An Anti-Insurgency Influence Operation, Wayne W. Wakeland, Una E. Medina
Wayne W. Wakeland
This paper contrasts the tradeoffs of modeling the same dynamic problem at a micro scale and at a macro scale of analysis: discrete system simulation (DS) versus continuous system simulation or system dynamics (SD). Both are employed to model the influence of entertainment education on terrorist system decay, with implications for field application. Each method optimizes different design, scope/scale, data availability/accuracy, parameter settings, and system sensitivities. Whether the research served by the computer model is applied or theoretical, DS tends to be useful for understand low-level individual unit/step influences on system change over time, whereas SD tends to shine when …
System Dynamics Implementation Of An Extended Brander And Taylor-Like Easter Island Model, Takuro Uehara, Yoko Nagase, Wayne W. Wakeland
System Dynamics Implementation Of An Extended Brander And Taylor-Like Easter Island Model, Takuro Uehara, Yoko Nagase, Wayne W. Wakeland
Wayne W. Wakeland
We provide a system dynamics implementation of a dynamic ecological economics model. Dynamic economic models are often constrained to use functions, such as the Cobb-Douglas function, chosen “conveniently” to allow for analytic solutions. The C-D function, however, suffers from its fixed elasticity that does not allow for the substitutability between man-made capital and natural capital to change, which is vital for economic sustainability. Using system dynamics removes this constraint and enables more realistic ecological economics models containing functions not amenable to analytic solution. The base model is the natural resource and population growth model developed by Brander and Taylor (1998) …
Disaster Recovery And Business Continuity Planning: Business Justification, Heather Brotherton
Disaster Recovery And Business Continuity Planning: Business Justification, Heather Brotherton
Heather M Brotherton
The purpose of this article is to establish the need for disaster recovery and business continuity planning for information systems. Today’s infrastructure and economic dependence upon information technology is highlighted as a basis for the requirement of disaster recovery and business continuity planning. This planning is stressed as a basic business requirement for any reputable information systems operation. The unique needs of information systems as well as the general background for the subject of disaster recovery and business continuity planning considerations are discussed. Contingency contracts, failover locations, and testing are recommended along with communication protocols. DOI:10.5055/jem.2010.0019
Rwanda National Customer Satisfaction Survey: Results And Conclusions, Deogratias Harorimana
Rwanda National Customer Satisfaction Survey: Results And Conclusions, Deogratias Harorimana
Dr Deogratias Harorimana
It can be said that development practice requires more than financial and manpower inputs. Rwanda, in 1994 suffered a Genocide. The Society,collectively and under the leadership of His Excellence Paul Kagame the current elected President of Rwanda came together and designed strategies that would propel Rwanda to a Middle-Income, Private Sector Led Economy by the Year 2020.
In 2009, a client seating in one of the Hotels in a Suburb of Remera, in Kigali City, complained about poor service delivery he was experiencing from the waitress staff.Using his Blackberry message, the client forwarded an email to some of the RDB …
A Graduate Education In Software Management And The Software Business For Mid-Career Professionals, Ray Bareiss, Gladys Mercier
A Graduate Education In Software Management And The Software Business For Mid-Career Professionals, Ray Bareiss, Gladys Mercier
Ray Bareiss
Given the unique nature of the software business, the faculty of Carnegie Mellon University’s Silicon Valley campus concluded that mid-career software professionals would be better served by a tailored master’s degree focusing on software management and more broadly on the business of software than by a typical MBA. Our software management master’s program integrates business, technical, and soft skills to prepare our students for technical leadership in their current companies or in entrepreneurial ventures. Our initial program built on the strengths of Carnegie Mellon’s world-class software engineering education. We targeted students working in large companies, engaged in large-scale enterprise software …
Coaching Via Cognitive Apprenticeship, Ray Bareiss, Martin Radley
Coaching Via Cognitive Apprenticeship, Ray Bareiss, Martin Radley
Ray Bareiss
At Carnegie Mellon’s Silicon Valley campus we employ a learn by- doing educational approach in which nearly all student learning, and thus instruction, is in the context of realistic, team based projects. Consequently, we have adopted coaching as our predominant teaching model. In this paper we reflect on our experience with the nature of teaching by coaching using a framework derived from Cognitive Apprenticeship, and explain how we employ the techniques it suggests in our teaching. We also discuss a range of instructional tensions that arise in teaching by coaching and present a survey of student attitudes regarding the effectiveness …
Enterprise Development Policies And Capacity-Building In Science, Technology And Innovation (Sti)-Response To The Issue Note, Deogratias Harorimana
Enterprise Development Policies And Capacity-Building In Science, Technology And Innovation (Sti)-Response To The Issue Note, Deogratias Harorimana
Dr Deogratias Harorimana
Enterprise Development, Investment and Business Climate are all important for economic growth. But what policies, strategies are needed to make economic growth a reality. The author has followed one of the World's fastest reformer and emerging nation in the Heart of Africa-Rwanda. The paper shares lessons and practical aspects related to building an entrepreneurial population, and building a government which is a facilitator of business climate
Explaining Cache Ser Anomaly Using Relative Due Avf Measurement, Arijit Biswas, Charles Recchia, Shubhendu Mukherjee, Vinod Ambrose, Leo Chan, Aamer Jaleel, Mike Plaster, Norbert Seifert
Explaining Cache Ser Anomaly Using Relative Due Avf Measurement, Arijit Biswas, Charles Recchia, Shubhendu Mukherjee, Vinod Ambrose, Leo Chan, Aamer Jaleel, Mike Plaster, Norbert Seifert
Charles H Recchia
No abstract provided.
Survey Report On Training And Spending On Customer Care Services, Deogratias Harorimana Sr
Survey Report On Training And Spending On Customer Care Services, Deogratias Harorimana Sr
Dr Deogratias Harorimana
In a bid to promote and develop good customer care service in various sectors of Rwandan economy, a survey was conducted to assess progress and trends on customer service capacity building. Although shortcomings are there, there have been efforts and registered trends across the country on service delivery front. Investment in Capacity Building IS happening in certain sectors but this is unevenly distributed. In 2008 companies had started recognizing the significance of good service and cultivate a good working environment and training. From 2009, there was a decline in investment in capacity building in front office and key service delivery …
Embedded Systems As Datacenters, Robert Iannucci
Embedded Systems As Datacenters, Robert Iannucci
Robert A Iannucci
No abstract provided.
Using A Majority Voting Hardware Method On Weather Information To Increase The Accuracy Of Decision Making Methods, Sanaz Asadinia
Using A Majority Voting Hardware Method On Weather Information To Increase The Accuracy Of Decision Making Methods, Sanaz Asadinia
Sanaz Asadinia
No abstract provided.
A Hybrid Routing Algorithm Based On Ant Colony And Zhls Routing Protocol For Manet, Marjan Rafsanjani, Sanaz Asadinia, Farzaneh Pakzad
A Hybrid Routing Algorithm Based On Ant Colony And Zhls Routing Protocol For Manet, Marjan Rafsanjani, Sanaz Asadinia, Farzaneh Pakzad
Sanaz Asadinia
Mobile Ad hoc networks (MANETs) require dynamic routing schemes for adequate performance. This paper, presents a new routing algorithm for MANETs, which combines the idea of ant colony optimization with Zone-based Hierarchical Link State (ZHLS) protocol. Ant colony optimization (ACO) is a class of Swarm Intelligence (SI) algorithms. SI is the local interaction of many simple agents to achieve a global goal. SI is based on social insect for solving different types of problems. ACO algorithm uses mobile agents called ants to explore network. Ants help to find paths between two nodes in the network. Our algorithm is based on …
Upper Bounds On The Number Of Channels To Ensure Collision-Free Communications In Multi-Channel Wireless Networks Using Directional Antennas, Hong-Ning Dai, Kam-Wing Ng, Min-You Wu
Upper Bounds On The Number Of Channels To Ensure Collision-Free Communications In Multi-Channel Wireless Networks Using Directional Antennas, Hong-Ning Dai, Kam-Wing Ng, Min-You Wu
Hong-Ning Dai
Recent studies have found that using multiple channels can separate concurrent transmissions and significantly improve network throughput. However, these studies have only considered wireless nodes that are equipped with omni-directional antennas, which have high interference. On the other hand, other researchers have found that using directional antennas in wireless networks can reduce interference and improve the network performance. But their studies have only considered single channel to be used in wireless networks with directional antennas. Thus, integrating the two technologies of multiple channels and directional antennas together can potentially bring more benefits. Some previous works have studies the capacity on …
Forensic Analysis Of A Playstation 3 Console, Scott Conrad, Greg Dorn, Philip Craiger
Forensic Analysis Of A Playstation 3 Console, Scott Conrad, Greg Dorn, Philip Craiger
J. Philip Craiger, Ph.D.