Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Digital libraries (17)
- Information retrieval (8)
- World Wide Web (8)
- Metadata (7)
- Digital preservation (6)
-
- Information dissemination (6)
- Sensor networks (6)
- Web archiving (6)
- Web archives (5)
- Engineering (4)
- Information systems (4)
- Machine learning (4)
- OAI-PMH (4)
- Online systems (4)
- Telecommunication (4)
- Vehicular ad hoc networks (Computer networks) (4)
- Websites (4)
- Blockchain (3)
- Computer programs (3)
- Computer science (3)
- Distributed processing (3)
- Document storage (3)
- Documents (3)
- Interoperability (3)
- IoT (3)
- Multicast (3)
- Protocol (Computers) (3)
- Software development tools (3)
- Telecommunications (3)
- Web sites (3)
- Publication Year
- Publication
-
- Computer Science Faculty Publications (39)
- Computer Science Theses & Dissertations (32)
- Cybersecurity Undergraduate Research Showcase (17)
- Electrical & Computer Engineering Theses & Dissertations (11)
- Electrical & Computer Engineering Faculty Publications (7)
-
- Computational Modeling & Simulation Engineering Faculty Publications (5)
- VMASC Publications (5)
- Engineering Technology Faculty Publications (4)
- Information Technology & Decision Sciences Faculty Publications (4)
- Computational Modeling & Simulation Engineering Theses & Dissertations (3)
- Computer Science Presentations (3)
- Distance Learning Faculty & Staff Books (3)
- Engineering Management & Systems Engineering Faculty Publications (2)
- Engineering Management & Systems Engineering Projects for D. Eng. Degree (2)
- Engineering Management & Systems Engineering Theses & Dissertations (2)
- School of Cybersecurity Faculty Publications (2)
- English Theses & Dissertations (1)
- The Journal of Sociotechnical Critique (1)
- Publication Type
Articles 31 - 60 of 143
Full-Text Articles in Computer Engineering
Virtual Satcom, Long Range Broadband Digital Communications, Dennis George Watson
Virtual Satcom, Long Range Broadband Digital Communications, Dennis George Watson
Electrical & Computer Engineering Theses & Dissertations
The current naval strategy is based on a distributed force, networked together with high-speed communications that enable operations as an intelligent, fast maneuvering force. Satellites, the existing network connector, are weak and vulnerable to attack. HF is an alternative, but it does not have the information throughput to meet the distributed warfighting need. The US Navy does not have a solution to reduce dependency on space-based communication systems while providing the warfighter with the required information speed.
Virtual SATCOM is a solution that can match satellite communications (SATCOM) data speed without the vulnerable satellite. It is wireless communication on a …
Topology Control, Scheduling, And Spectrum Sensing In 5g Networks, Prosanta Paul
Topology Control, Scheduling, And Spectrum Sensing In 5g Networks, Prosanta Paul
Electrical & Computer Engineering Theses & Dissertations
The proliferation of intelligent wireless devices is remarkable. To address phenomenal traffic growth, a key objective of next-generation wireless networks such as 5G is to provide significantly larger bandwidth. To this end, the millimeter wave (mmWave) band (20 GHz -300 GHz) has been identified as a promising candidate for 5G and WiFi networks to support user data rates of multi-gigabits per second. However, path loss at mmWave is significantly higher than today's cellular bands. Fortunately, this higher path loss can be compensated through the antenna beamforming technique-a transmitter focuses a signal towards a specific direction to achieve high signal gain …
Minding Morality: Ethical Artificial Societies For Public Policy Modeling, Saikou Y. Diallo, F. Leron Shults, Wesley J. Wildman
Minding Morality: Ethical Artificial Societies For Public Policy Modeling, Saikou Y. Diallo, F. Leron Shults, Wesley J. Wildman
VMASC Publications
Public policies are designed to have an impact on particular societies, yet policy-oriented computer models and simulations often focus more on articulating the policies to be applied than on realistically rendering the cultural dynamics of the target society. This approach can lead to policy assessments that ignore crucial social contextual factors. For example, by leaving out distinctive moral and normative dimensions of cultural contexts in artificial societies, estimations of downstream policy effectiveness fail to account for dynamics that are fundamental in human life and central to many public policy challenges. In this paper, we supply evidence that incorporating morally salient …
A Tutorial And Future Research For Building A Blockchain-Based Secure Communication Scheme For Internet Of Intelligent Things, Mohammad Wazid, Ashok Kumar Das, Sachin Shetty, Minho Jo
A Tutorial And Future Research For Building A Blockchain-Based Secure Communication Scheme For Internet Of Intelligent Things, Mohammad Wazid, Ashok Kumar Das, Sachin Shetty, Minho Jo
Computational Modeling & Simulation Engineering Faculty Publications
The Internet of Intelligent Things (IoIT) communication environment can be utilized in various types of applications (for example, intelligent battlefields, smart healthcare systems, the industrial internet, home automation, and many more). Communications that happen in such environments can have different types of security and privacy issues, which can be resolved through the utilization of blockchain. In this paper, we propose a tutorial that aims in desiging a generalized blockchain-based secure authentication key management scheme for the IoIT environment. Moreover, some issues with using blockchain for a communication environment are discussed as future research directions. The details of different types of …
Smart Communities: From Sensors To Internet Of Things And To A Marketplace Of Services, Stephan Olariu, Nirwan Ansari (Editor), Andreas Ahrens (Editor), Cesar Benavente-Preces (Editor)
Smart Communities: From Sensors To Internet Of Things And To A Marketplace Of Services, Stephan Olariu, Nirwan Ansari (Editor), Andreas Ahrens (Editor), Cesar Benavente-Preces (Editor)
Computer Science Faculty Publications
Our paper was inspired by the recent Society 5.0 initiative of the Japanese Government that seeks to create a sustainable human-centric society by putting to work recent advances in technology: sensor networks, edge computing, IoT ecosystems, AI, Big Data, robotics, to name just a few. The main contribution of this work is a vision of how these technological advances can contribute, directly or indirectly, to making Society 5.0 reality. For this purpose we build on a recently-proposed concept of Marketplace of Services that, in our view, will turn out to be one of the cornerstones of Society 5.0. Instead of …
Iot Devices In The Public Health Sector, Cayla Young
Iot Devices In The Public Health Sector, Cayla Young
Cybersecurity Undergraduate Research Showcase
In this research, proper attention is drawn to privacy and security concerns with the integration of Internet of Things (IoT) devices in the public health sector. Often, not much attention is given to IoT devices and its vulnerabilities concerning the medical industry. Effects of COVID-19 contact tracing applications are explored through research of various source types. Mitigation techniques for these privacy and security issues is given. Focus is brought to topics outlining the risks associated with genetic testing companies and the vulnerabilities of data collection and data storage. Recommendations are provided to help consumers avoid these risks. Lastly, a comprehensive …
Exploring The Relationship Between Teamwork Skills And Team Members' Centrality, Francisco Cima, Pilar Pazos, Ana Maria Canto
Exploring The Relationship Between Teamwork Skills And Team Members' Centrality, Francisco Cima, Pilar Pazos, Ana Maria Canto
Engineering Management & Systems Engineering Faculty Publications
The present paper describes an exploratory study of small teams working on a four-month project as part of a graduate engineering program. The research had two primary goals. The first was to utilize the log files from shared repositories used for team collaboration to describe the network structure of the teams. The second was to determine whether the network centrality of any individual team member is associated with their teamwork skills and attitudes towards the collaboration platform. The relationship between teamwork skills, attitudes towards the collaboration technology, and the centrality index was explored using Pearson correlations. A total of 35 …
Deepmag+ : Sniffing Mobile Apps In Magnetic Field Through Deep Learning, Rui Ning, Cong Wang, Chunsheng Xin, Jiang Li, Hongyi Wu
Deepmag+ : Sniffing Mobile Apps In Magnetic Field Through Deep Learning, Rui Ning, Cong Wang, Chunsheng Xin, Jiang Li, Hongyi Wu
Electrical & Computer Engineering Faculty Publications
This paper reports a new side-channel attack to smartphones using the unrestricted magnetic sensor data. We demonstrate that attackers can effectively infer the Apps being used on a smartphone with an accuracy of over 80%, through training a deep Convolutional Neural Networks (CNN). Various signal processing strategies have been studied for feature extractions, including a tempogram based scheme. Moreover, by further exploiting the unrestricted motion sensor to cluster magnetometer data, the sniffing accuracy can increase to as high as 98%. To mitigate such attacks, we propose a noise injection scheme that can effectively reduce the App sniffing accuracy to only …
Iomt Malware Detection Approaches: Analysis And Research Challenges, Mohammad Wazid, Ashok Kumar Das, Joel J.P.C. Rodrigues, Sachin Shetty, Youngho Park
Iomt Malware Detection Approaches: Analysis And Research Challenges, Mohammad Wazid, Ashok Kumar Das, Joel J.P.C. Rodrigues, Sachin Shetty, Youngho Park
VMASC Publications
The advancement in Information and Communications Technology (ICT) has changed the entire paradigm of computing. Because of such advancement, we have new types of computing and communication environments, for example, Internet of Things (IoT) that is a collection of smart IoT devices. The Internet of Medical Things (IoMT) is a specific type of IoT communication environment which deals with communication through the smart healthcare (medical) devices. Though IoT communication environment facilitates and supports our day-to-day activities, but at the same time it has also certain drawbacks as it suffers from several security and privacy issues, such as replay, man-in-the-middle, impersonation, …
Ldakm-Eiot: Lightweight Device Authentication And Key Management Mechanism For Edge-Based Iot Deployment, Mohammad Wazid, Ashok Kumar Das, Sachin Shetty, Joel J. P. C. Rodrigues, Youngho Park
Ldakm-Eiot: Lightweight Device Authentication And Key Management Mechanism For Edge-Based Iot Deployment, Mohammad Wazid, Ashok Kumar Das, Sachin Shetty, Joel J. P. C. Rodrigues, Youngho Park
VMASC Publications
In recent years, edge computing has emerged as a new concept in the computing paradigm that empowers several future technologies, such as 5G, vehicle-to-vehicle communications, and the Internet of Things (IoT), by providing cloud computing facilities, as well as services to the end users. However, open communication among the entities in an edge based IoT environment makes it vulnerable to various potential attacks that are executed by an adversary. Device authentication is one of the prominent techniques in security that permits an IoT device to authenticate mutually with a cloud server with the help of an edge node. If authentication …
Impact Of Http Cookie Violations In Web Archives, Sawood Alam, Michele C. Weigle, Michael L. Nelson
Impact Of Http Cookie Violations In Web Archives, Sawood Alam, Michele C. Weigle, Michael L. Nelson
Computer Science Faculty Publications
Certain HTTP Cookies on certain sites can be a source of content bias in archival crawls. Accommodating Cookies at crawl time, but not utilizing them at replay time may cause cookie violations, resulting in defaced composite mementos that never existed on the live web. To address these issues, we propose that crawlers store Cookies with short expiration time and archival replay systems account for values in the Vary header along with URIs.
Evaluating Stakeholder Bias In Stakeholder Analysis In Social Media, Ahmad A. Bajarwan
Evaluating Stakeholder Bias In Stakeholder Analysis In Social Media, Ahmad A. Bajarwan
Engineering Management & Systems Engineering Theses & Dissertations
Stakeholder analysis is the first step in the planning of most infrastructure projects. Selecting and then applying the best method for a project’s stakeholder analysis is extremely important for correctly assessing stakeholder opinions. Social media platforms allow stakeholders to participate directly in analysis. However, as with most other analysis methods, social media introduces inherent biases.
Social media is a powerful tool for communication and networking, and it also provides a valuable source of information for analyzing user opinions about infrastructure projects. By using data collected from Twitter, analysts can create networks to represent connections among users, quantify their similarities, and …
A Companion Study Guide For The Cisco Dcicn Data Center Certification Exam (200-150), Miguel Ramlatchan
A Companion Study Guide For The Cisco Dcicn Data Center Certification Exam (200-150), Miguel Ramlatchan
Distance Learning Faculty & Staff Books
The official Cisco DCICN book and practice exams are great resources, but this is not an easy exam. This study guide is a companion to those resources and summarizes the subject areas into additional review questions with an answer description for each item. This book is not a "braindump" and it is not bootleg screenshots of the actual exam. Instead, this book provides additional context and examples, serves to complement other study guides, and provides additional examples. If you are getting ready to take the exam for the first time, I hope that this guide provides the extra help to …
Wireless Sensor Networks For Smart Communications, Mu Zhou, Qilian Liang, Hongyi Wu, Weixiao Meng, Kunjie Xu
Wireless Sensor Networks For Smart Communications, Mu Zhou, Qilian Liang, Hongyi Wu, Weixiao Meng, Kunjie Xu
Electrical & Computer Engineering Faculty Publications
(First paragraph) In the first edition of the special issue titled “Wireless Sensor Networks for Smart Communications”, a total of 22 manuscripts were received and 6 of these were accepted. This issue demonstrated that network congestion, user mobility, and adjacent spectrum interference are the main reasons for the degradation ofcommunication quality inWireless Sensor Networks (WSNs).
To Relive The Web: A Framework For The Transformation And Archival Replay Of Web Pages, John Andrew Berlin
To Relive The Web: A Framework For The Transformation And Archival Replay Of Web Pages, John Andrew Berlin
Computer Science Theses & Dissertations
When replaying an archived web page (known as a memento), the fundamental expectation is that the page should be viewable and function exactly as it did at archival time. However, this expectation requires web archives to modify the page and its embedded resources, so that they no longer reference (link to) the original server(s) they were archived from but back to the archive. Although these modifications necessarily change the state of the representation, it is understood that without them the replay of mementos from the archive would not be possible. Unfortunately, because the replay of mementos and the modifications made …
A Reliable Data Provenance And Privacy Preservation Architecture For Business-Driven Cyber-Physical Systems Using Blockchain, Xueping Liang, Sachin Shetty, Deepak K. Tosh, Juan Zhao, Danyi Li, Jihong Liu
A Reliable Data Provenance And Privacy Preservation Architecture For Business-Driven Cyber-Physical Systems Using Blockchain, Xueping Liang, Sachin Shetty, Deepak K. Tosh, Juan Zhao, Danyi Li, Jihong Liu
VMASC Publications
Cyber-physical systems (CPS) including power systems, transportation, industrial control systems, etc. support both advanced control and communications among system components. Frequent data operations could introduce random failures and malicious attacks or even bring down the whole system. The dependency on a central authority increases the risk of single point of failure. To establish an immutable data provenance scheme for CPS, the authors adopt blockchain and propose a decentralized architecture to assure data integrity. In business-driven CPS, end users are required to share their personal information with multiple third parties. To prevent data leakage and preserve user privacy, the authors isolate …
Coexistence And Secure Communication In Wireless Networks, Saygin Bakşi
Coexistence And Secure Communication In Wireless Networks, Saygin Bakşi
Electrical & Computer Engineering Theses & Dissertations
In a wireless system, transmitted electromagnetic waves can propagate in all directions and can be received by other users in the system. The signals received by unintended receivers pose two problems; increased interference causing lower system throughput or successful decoding of the information which removes secrecy of the communication. Radio frequency spectrum is a scarce resource and it is allocated by technologies already in use. As a result, many communication systems use the spectrum opportunistically whenever it is available in cognitive radio setting or use unlicensed bands. Hence, efficient use of spectrum by sharing users is crucial to increase maximize …
Applying Machine Learning To Advance Cyber Security: Network Based Intrusion Detection Systems, Hassan Hadi Latheeth Al-Maksousy
Applying Machine Learning To Advance Cyber Security: Network Based Intrusion Detection Systems, Hassan Hadi Latheeth Al-Maksousy
Computer Science Theses & Dissertations
Many new devices, such as phones and tablets as well as traditional computer systems, rely on wireless connections to the Internet and are susceptible to attacks. Two important types of attacks are the use of malware and exploiting Internet protocol vulnerabilities in devices and network systems. These attacks form a threat on many levels and therefore any approach to dealing with these nefarious attacks will take several methods to counter. In this research, we utilize machine learning to detect and classify malware, visualize, detect and classify worms, as well as detect deauthentication attacks, a form of Denial of Service (DoS). …
Scalable And Fully Distributed Localization In Large-Scale Sensor Networks, Miao Jin, Su Xia, Hongyi Wu, Xianfeng David Gu
Scalable And Fully Distributed Localization In Large-Scale Sensor Networks, Miao Jin, Su Xia, Hongyi Wu, Xianfeng David Gu
Electrical & Computer Engineering Faculty Publications
This work proposes a novel connectivity-based localization algorithm, well suitable for large-scale sensor networks with complex shapes and a non-uniform nodal distribution. In contrast to current state-of-the-art connectivity-based localization methods, the proposed algorithm is highly scalable with linear computation and communication costs with respect to the size of the network; and fully distributed where each node only needs the information of its neighbors without cumbersome partitioning and merging process. The algorithm is theoretically guaranteed and numerically stable. Moreover, the algorithm can be readily extended to the localization of networks with a one-hop transmission range distance measurement, and the propagation of …
A Mobile Platform Using Software Defined Radios For Wireless Communication Systems Experimentation, Otilia Popescu, Shiny Abraham, Samy El-Tawab
A Mobile Platform Using Software Defined Radios For Wireless Communication Systems Experimentation, Otilia Popescu, Shiny Abraham, Samy El-Tawab
Engineering Technology Faculty Publications
A distinctive feature of wireless communication systems is implied by the fact that there is no physical connection between the transmitter and its corresponding receiver, which enables user mobility. However, experimenting with wireless communication systems is mostly done in the lab, where transmitters and receivers are setup on benches, in stationary settings. This prevents students from experiencing fading and other propagation effects associated with mobile wireless channels. This paper describes a mobile platform for wireless communication experimentation that enables students to run experiments beyond the confines of a traditional lab, in realistic settings that cover indoor and outdoor scenarios with …
Industrial Wireless Sensor Networks 2016, Qindong Sun, Schancang Li, Shanshan Zhao, Hongjian Sun, Li Xu, Arumugam Nallamathan
Industrial Wireless Sensor Networks 2016, Qindong Sun, Schancang Li, Shanshan Zhao, Hongjian Sun, Li Xu, Arumugam Nallamathan
Information Technology & Decision Sciences Faculty Publications
The industrial wireless sensor network (IWSN) is the next frontier in the Industrial Internet of Things (IIoT), which is able to help industrial organizations to gain competitive advantages in industrial manufacturing markets by increasing productivity, reducing the costs, developing new products and services, and deploying new business models.
Qos Recommendation In Cloud Services, Xianrong Zheng, Li Da Xu, Sheng Chai
Qos Recommendation In Cloud Services, Xianrong Zheng, Li Da Xu, Sheng Chai
Information Technology & Decision Sciences Faculty Publications
As cloud computing becomes increasingly popular, cloud providers compete to offer the same or similar services over the Internet. Quality of service (QoS), which describes how well a service is performed, is an important differentiator among functionally equivalent services. It can help a firm to satisfy and win its customers. As a result, how to assist cloud providers to promote their services and cloud consumers to identify services that meet their QoS requirements becomes an important problem. In this paper, we argue for QoS-based cloud service recommendation, and propose a collaborative filtering approach using the Spearman coefficient to recommend cloud …
Secrecy Rates And Optimal Power Allocation For Full-Duplex Decode-And-Forward Relay Wire-Tap Channels, Lubna Elsaid, Leonardo Jimenez-Rodriguez, Nghi H. Tran, Sachin Shetty, Shivakumar Sastry
Secrecy Rates And Optimal Power Allocation For Full-Duplex Decode-And-Forward Relay Wire-Tap Channels, Lubna Elsaid, Leonardo Jimenez-Rodriguez, Nghi H. Tran, Sachin Shetty, Shivakumar Sastry
Computational Modeling & Simulation Engineering Faculty Publications
This paper investigates the secrecy rates and optimal power allocation schemes for a decode-and-forward wiretap relay channel where the transmission from a source to a destination is aided by a relay operating in a full-duplex (FD) mode under practical residual self-interference. By first considering static channels, we address the non-convex optimal power allocation problems between the source and relay nodes under individual and joint power constraints to establish closed-form solutions. An asymptotic analysis is then given to provide important insights on the derived power allocation solutions. Specifically, by using the method of dominant balance, it is demonstrated that full power …
Hoeffding Tree Algorithms For Anomaly Detection In Streaming Datasets: A Survey, Asmah Muallem, Sachin Shetty, Jan W. Pan, Juan Zhao, Biswajit Biswal
Hoeffding Tree Algorithms For Anomaly Detection In Streaming Datasets: A Survey, Asmah Muallem, Sachin Shetty, Jan W. Pan, Juan Zhao, Biswajit Biswal
Computational Modeling & Simulation Engineering Faculty Publications
This survey aims to deliver an extensive and well-constructed overview of using machine learning for the problem of detecting anomalies in streaming datasets. The objective is to provide the effectiveness of using Hoeffding Trees as a machine learning algorithm solution for the problem of detecting anomalies in streaming cyber datasets. In this survey we categorize the existing research works of Hoeffding Trees which can be feasible for this type of study into the following: surveying distributed Hoeffding Trees, surveying ensembles of Hoeffding Trees and surveying existing techniques using Hoeffding Trees for anomaly detection. These categories are referred to as compositions …
Leveraging Heritrix And The Wayback Machine On A Corporate Intranet: A Case Study On Improving Corporate Archives, Justin F. Brunelle, Krista Ferrante, Eliot Wilczek, Michele C. Weigle, Michael L. Nelson
Leveraging Heritrix And The Wayback Machine On A Corporate Intranet: A Case Study On Improving Corporate Archives, Justin F. Brunelle, Krista Ferrante, Eliot Wilczek, Michele C. Weigle, Michael L. Nelson
Computer Science Faculty Publications
In this work, we present a case study in which we investigate using open-source, web-scale web archiving tools (i.e., Heritrix and the Wayback Machine installed on the MITRE Intranet) to automatically archive a corporate Intranet. We use this case study to outline the challenges of Intranet web archiving, identify situations in which the open source tools are not well suited for the needs of the corporate archivists, and make recommendations for future corporate archivists wishing to use such tools. We performed a crawl of 143,268 URIs (125 GB and 25 hours) to demonstrate that the crawlers are easy to set …
Detecting, Modeling, And Predicting User Temporal Intention, Hany M. Salaheldeen
Detecting, Modeling, And Predicting User Temporal Intention, Hany M. Salaheldeen
Computer Science Theses & Dissertations
The content of social media has grown exponentially in the recent years and its role has evolved from narrating life events to actually shaping them. Unfortunately, content posted and shared in social networks is vulnerable and prone to loss or change, rendering the context associated with it (a tweet, post, status, or others) meaningless. There is an inherent value in maintaining the consistency of such social records as in some cases they take over the task of being the first draft of history as collections of these social posts narrate the pulse of the street during historic events, protest, riots, …
Reminiscing About 15 Years Of Interoperability Efforts, Herbert Van De Sompel, Michael L. Nelson
Reminiscing About 15 Years Of Interoperability Efforts, Herbert Van De Sompel, Michael L. Nelson
Computer Science Faculty Publications
Over the past fifteen years, our perspective on tackling information interoperability problems for web-based scholarship has evolved significantly. In this opinion piece, we look back at three efforts that we have been involved in that aptly illustrate this evolution: OAI-PMH, OAI-ORE, and Memento. Understanding that no interoperability specification is neutral, we attempt to characterize the perspectives and technical toolkits that provided the basis for these endeavors. With that regard, we consider repository-centric and web-centric interoperability perspectives, and the use of a Linked Data or a REST/HATEAOS technology stack, respectively. We also lament the lack of interoperability across nodes that play …
Wireless Networking For Vehicle To Infrastructure Communication And Automatic Incident Detection, Sarwar Aziz Sha-Mohammad
Wireless Networking For Vehicle To Infrastructure Communication And Automatic Incident Detection, Sarwar Aziz Sha-Mohammad
Computer Science Theses & Dissertations
Vehicular wireless communication has recently generated wide interest in the area of wireless network research. Automatic Incident Detection (AID), which is the recent focus of research direction in Intelligent Transportation System (ITS), aims to increase road safety. These advances in technology enable traffic systems to use data collected from vehicles on the road to detect incidents. We develop an automatic incident detection method that has a significant active road safety application for alerting drivers about incidents and congestion. Our method for detecting traffic incidents in a highway scenario is based on the use of distance and time for changing lanes …
Strategies For Sensor Data Aggregation In Support Of Emergency Response, X. Wang, A. Walden, M. Weigle, S. Olariu
Strategies For Sensor Data Aggregation In Support Of Emergency Response, X. Wang, A. Walden, M. Weigle, S. Olariu
Computer Science Presentations
PDF of a powerpoint presentation from the Military Communications Conference (MILCOM), Baltimore, Maryland, October 7, 2014. Also available on Slideshare.
A Framework For Web Object Self-Preservation, Charles L. Cartledge
A Framework For Web Object Self-Preservation, Charles L. Cartledge
Computer Science Theses & Dissertations
We propose and develop a framework based on emergent behavior principles for the long-term preservation of digital data using the web infrastructure. We present the development of the framework called unsupervised small-world (USW) which is at the nexus of emergent behavior, graph theory, and digital preservation. The USW algorithm creates graph based structures on the Web used for preservation of web objects (WOs). Emergent behavior activities, based on Craig Reynolds’ “boids” concept, are used to preserve WOs without the need for a central archiving authority. Graph theory is extended by developing an algorithm that incrementally creates small-world graphs. Graph theory …