Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Wright State University (167)
- Embry-Riddle Aeronautical University (28)
- TÜBİTAK (24)
- Washington University in St. Louis (21)
- Selected Works (18)
-
- Singapore Management University (9)
- University of Arkansas, Fayetteville (6)
- Old Dominion University (5)
- SelectedWorks (5)
- Air Force Institute of Technology (4)
- Portland State University (3)
- University of Dayton (3)
- Munster Technological University (2)
- University of Rhode Island (2)
- Chapman University (1)
- Claremont Colleges (1)
- Pace University (1)
- San Jose State University (1)
- Technological University Dublin (1)
- University of Nevada, Las Vegas (1)
- University of New Mexico (1)
- University of Wollongong (1)
- Keyword
-
- Department of Computer Science and Engineering (5)
- Algorithms (3)
- Optimization (3)
- Privacy (3)
- Access control (2)
-
- Antenna arrays (2)
- Computer Forensics (2)
- Computer security (2)
- Critical Infrastructure Assurance (2)
- Data disposal (2)
- Data recovery (2)
- Digital Forensics (2)
- Digital forensics (2)
- Digital libraries (2)
- EMI/EMC Protection (2)
- Electronic data destruction (2)
- Engineering (2)
- Genetic Algorithm (2)
- Intentional EMI (2)
- Oceanography (2)
- QoS provision (2)
- System Effects and Hardening (2)
- System Vulnerabilities (2)
- Tagging Network (2)
- Web Application (2)
- Wireless Communications (2)
- 1.2 COMPUTER AND INFORMATION SCIENCE (1)
- 2.2 ELECTRICAL, ELECTRONIC, INFORMATION ENGINEERING (1)
- ADCR (1)
- Adaptive characteristic (1)
- Publication
-
- Computer Science & Engineering Syllabi (162)
- Turkish Journal of Electrical Engineering and Computer Sciences (24)
- All Computer Science and Engineering Research (21)
- Journal of Digital Forensics, Security and Law (21)
- Professor Aditya K. Ghose (12)
-
- Research Collection School Of Computing and Information Systems (9)
- Annual ADFSL Conference on Digital Forensics, Security and Law (6)
- Computer Science and Computer Engineering Undergraduate Honors Theses (6)
- Browse all Theses and Dissertations (5)
- Chien Hsun Chen (4)
- Dissertations and Theses (3)
- Electrical and Computer Engineering Faculty Publications (3)
- Theses and Dissertations (3)
- Computer Science Faculty Publications (2)
- Computer Science Theses & Dissertations (2)
- George H Baker (2)
- Graduate School of Oceanography Faculty Publications (2)
- Zheng Sun (2)
- Articles (1)
- Branch Mathematics and Statistics Faculty and Staff Publications (1)
- CGU Faculty Publications and Research (1)
- Christopher N. Roman (1)
- Computational Modeling & Simulation Engineering Theses & Dissertations (1)
- Cornerstone 3 Reports : Interdisciplinary Informatics (1)
- Dr Deogratias Harorimana (1)
- Engineering Faculty Articles and Research (1)
- Faculty Publications (1)
- Faculty Publications, Computer Science (1)
- Faculty of Informatics - Papers (Archive) (1)
- Fuels Campaign (TRP) (1)
- Publication Type
Articles 31 - 60 of 305
Full-Text Articles in Computer Engineering
Cs 415: Social Implications Of Computing, Leo Finkelstein
Cs 415: Social Implications Of Computing, Leo Finkelstein
Computer Science & Engineering Syllabi
CS 415 is a communication skills course using as its subject matter current salient issues associated with the social implications of computing. In addition to the course text, you will need to use certain reading materials in the library and elsewhere, and you will be responsible for using concepts and theories provided in class lectures and discussions.
Cs 410/610: Theoretical Foundations Of Computing, Thomas Sudkamp
Cs 410/610: Theoretical Foundations Of Computing, Thomas Sudkamp
Computer Science & Engineering Syllabi
This course is an introduction to one of the fundamental topics in the theory of computer science: computability theory. Computability theory is concerned with determining whether there is an algorithmic solution to a problem. The study of computability uses the Turing machine as the basic computational model. A Turing machine is a random access, read-write, finite state automaton. Although the Turing machine provides a simple computational framework, the Church-Turing thesis asserts that any problem that can be solved in any algorithmic manner can be solved by a Turing machine.
Cs 466/666: Introduction To Formal Languages, Guozhu Dong
Cs 466/666: Introduction To Formal Languages, Guozhu Dong
Computer Science & Engineering Syllabi
CS 466/666 is an introduction to formal language and automata theory. In this course we will examine methods for defining syntax of languages and recognizing patterns: the syntax of languages can be defined using grammars and patterns accepted by finite state machines. Along with presenting the fundamentals of these two topics, the course will develop and investigate the relationships between language definition and pattern recognition. The text will be the third edition of Languages and Machines: An Introduction to the Theory of Computer Science, by Thomas Sudkamp.
Cs 780: Compiler Design And Construction I, Krishnaprasad Thirunarayan
Cs 780: Compiler Design And Construction I, Krishnaprasad Thirunarayan
Computer Science & Engineering Syllabi
This course deals with the theory and practice of compiler design. Topics emphasized are scanning and parsing. If time permits, semantic analysis will also be covered.
Cs 766: Evolutionary Computation, Mateen M. Rizki
Cs 766: Evolutionary Computation, Mateen M. Rizki
Computer Science & Engineering Syllabi
This course explores evolutionary computation from a historical, theoretical, and application viewpoint. An overview of the most common evolutionary search techniques are presented including genetic algorithms, evolutionary programming, evolutionary strategies, and genetic programming. The fundamental issues driving the choice of problem representation and specific genetic operators are discussed. Various applications of evolutionary computation to problems in control, optimization, and pattern recognition are examined.
Cs/Bio 471/671: Algorithms For Bioinformatics, Michael L. Raymer
Cs/Bio 471/671: Algorithms For Bioinformatics, Michael L. Raymer
Computer Science & Engineering Syllabi
Theory-oriented approach to the application of contemporary algorithms to bioinformatics. Graph theory, complexity theory, dynamic programming and optimization techniques are introduced in the context of application toward solving specific computational problems in molecular genetics. 4 credit hours.
Cs 141: Computer Programming - I, Michael Ondrasek
Cs 141: Computer Programming - I, Michael Ondrasek
Computer Science & Engineering Syllabi
This course provides a general introduction to the fundamentals of computer programming. Examples from and applications to a broad range of problems are given. No prior knowledge of programming is assumed. The concepts covered will be applied to the Java programming language. Students must register for both lecture and one laboratory section. 4 credit hours. Prerequisite: MTH 127 (College Algebra) or equivalent.
Cs 205-08: Introduction To Computers And Office Productivity Software, Kim Gros
Cs 205-08: Introduction To Computers And Office Productivity Software, Kim Gros
Computer Science & Engineering Syllabi
Focus on learning MS Office software applications including word processing (intermediate), spreadsheets, database and presentation graphics using a case study approach where critical thinking and problem solving skills are required. Computer concepts are integrated throughout the course to provide an understanding of the basics of computing, the latest technological advances and how they are used in industry. Ethics and issues encountered in business are discussed to challenge students on societal impact of technology.
Cs 205: Computer Literacy And Office Automation, Ann Tirpack
Cs 205: Computer Literacy And Office Automation, Ann Tirpack
Computer Science & Engineering Syllabi
No abstract provided.
Cs 214: Visual Basic Programming, Vanessa Starkey
Cs 214: Visual Basic Programming, Vanessa Starkey
Computer Science & Engineering Syllabi
This course will cover the fundamentals of object-oriented computer programming including design, structure, debugging, and testing. Visual Basic 2008 will be used for developing programs.
Cs 241: Introduction To Computer Science Ii, Ronald F. Taylor
Cs 241: Introduction To Computer Science Ii, Ronald F. Taylor
Computer Science & Engineering Syllabi
A continuation of CS 240. Emphasis is on solving more complex problems using object oriented programming. Prerequisite: CS 240. 4 credit hours.
Cs 240: Introduction To Computer Science I, Mateen M. Rizki
Cs 240: Introduction To Computer Science I, Mateen M. Rizki
Computer Science & Engineering Syllabi
No abstract provided.
Cs 242: Computer Programming Iii, Tom S. Wailes
Cs 242: Computer Programming Iii, Tom S. Wailes
Computer Science & Engineering Syllabi
No abstract provided.
Cs 405/605: Introduction To Database Management Systems, Soon M. Chung
Cs 405/605: Introduction To Database Management Systems, Soon M. Chung
Computer Science & Engineering Syllabi
Survey of logical and physical aspects of database management systems. Entity Relationship, relational, object-oriented models for databases are presented. Physical implementation methods are discussed.
Cs 875: Semantic Web, Amit P. Sheth
Cs 875: Semantic Web, Amit P. Sheth
Computer Science & Engineering Syllabi
World Wide Web (Web 1.0, or "the Web," as we now know it) centers on documents and semistructured data in html, rss, and xml. The next generation Web, also called Web 2.0 and Web 3.0, has already started to emerge. Web 2.0 is about user-generated content, user participation such as through tagging, and social networking. Web 3.0, also called Semantic Web, is about labeling content such that machines can process it more intelligently and humans can exploit it more effectively. These labels or metadata add semantics (meaning) to data, and their formal representation enables powerful reasoning that leads not only …
Ceg 770: Computer Engineering Mathematics, Yong Pei
Ceg 770: Computer Engineering Mathematics, Yong Pei
Computer Science & Engineering Syllabi
Computer Engineering and Science students need proficiency in relevant applied mathematics to be able to discover and model difficult real-world computer engineering and science problems. The relationship of these problems to mathematical theory will be discussed. This course provides an introduction to linear and nonlinear programming, probability and stochastic process, and queueing theory. In addition to mathematical theory, appropriate applications will be presented.
Ceg 399: Introduction To Software Testing, John A. Reisner
Ceg 399: Introduction To Software Testing, John A. Reisner
Computer Science & Engineering Syllabi
This course covers software testing strategies, along with established best practices, so students learn how to test their software in a complete and systematic (vice ad-hoc) manner. Particular attention is paid to planning, writing, and executing software testing documentation, i.e., software test plan, to include documented results. Various projects are assigned, designed to illustrate various challenges associated with software testing, and to reinforce the strategies and techniques used to overcome these challenges
Cs 712: Advanced Topics In Artificial Intelligence: Inference Graphical Models, Shaojun Wang
Cs 712: Advanced Topics In Artificial Intelligence: Inference Graphical Models, Shaojun Wang
Computer Science & Engineering Syllabi
No abstract provided.
Cs 705: Introduction To Data Mining, Guozhu Dong
Cs 705: Introduction To Data Mining, Guozhu Dong
Computer Science & Engineering Syllabi
Data mining is concerned with the extraction of novel and useful knowledge from large amounts of data. This course introduces and studies the fundamental concepts, issues, tasks and techniques of data mining. Topics include data preparation and feature selection, association rules, classification, clustering, evaluation and validation, scalability, spatial and sequence mining, privacy, and data mining applications. 3 hours lecture, 2 hours lab.
Cs 209: Computer Programming For Business Ii, David M. Hutchison
Cs 209: Computer Programming For Business Ii, David M. Hutchison
Computer Science & Engineering Syllabi
CS 209 is the second in a sequence of two programming classes required for
MIS majors. This course will continue teaching students to the basic concepts
of programming. Examples are from business applications and emphasis is on
problem solving with the computer as a tool.
Cs 409/609: Principles Of Artificial Intelligence, Shaojun Wang
Cs 409/609: Principles Of Artificial Intelligence, Shaojun Wang
Computer Science & Engineering Syllabi
No abstract provided.
Cs 784: Programming Languages, Krishnaprasad Thirunarayan
Cs 784: Programming Languages, Krishnaprasad Thirunarayan
Computer Science & Engineering Syllabi
To provide a solid foundation for studying advanced topics in Programming Language Specification and Design.
Cs/Mth 316/516: Numerical Methods For Digital Computers - I, Ronald F. Taylor
Cs/Mth 316/516: Numerical Methods For Digital Computers - I, Ronald F. Taylor
Computer Science & Engineering Syllabi
Introduction to numerical methods used in the sciences. Methods of interpolation, data smoothing, functional approximation, numerical differentiation and integration. Solution techniques for linear and nonlinear equations. Discussion of sources of error in numerical methods. Applications to engineering, science, and applied mathematics are an integral part of the course. Special topics presented as schedule permits. 4 credit hours.
Cs 480/680: Comparative Programming Languages, Michael L. Raymer
Cs 480/680: Comparative Programming Languages, Michael L. Raymer
Computer Science & Engineering Syllabi
No abstract provided.
Fusing Semantics, Observability, Reliability And Diversity Of Concept Detectors For Video Search, Xiao-Yong Wei, Chong-Wah Ngo
Fusing Semantics, Observability, Reliability And Diversity Of Concept Detectors For Video Search, Xiao-Yong Wei, Chong-Wah Ngo
Research Collection School Of Computing and Information Systems
Effective utilization of semantic concept detectors for large-scale video search has recently become a topic of intensive studies. One of main challenges is the selection and fusion of appropriate detectors, which considers not only semantics but also the reliability of detectors, observability and diversity of detectors in target video domains. In this paper, we present a novel fusion technique which considers different aspects of detectors for query answering. In addition to utilizing detectors for bridging the semantic gap of user queries and multimedia data, we also address the issue of "observability gap" among detectors which could not be directly inferred …
Ontology-Based Visual Word Matching For Near-Duplicate Retrieval, Yu-Gang Jiang, Chong-Wah Ngo
Ontology-Based Visual Word Matching For Near-Duplicate Retrieval, Yu-Gang Jiang, Chong-Wah Ngo
Research Collection School Of Computing and Information Systems
This paper proposes a novel approach to exploit the ontological relationship of visual words by linguistic reasoning. A visual word ontology is constructed to facilitate the rigorous evaluation of linguistic similarity across visual words. The linguistic similarity measurement enables cross-bin matching of visual words, compromising the effectiveness and speed of conventional keypoint matching and bag-of-word approaches. A constraint EMD is proposed and experimented to efficiently match visual words. Empirical findings indicate that the proposed approach offers satisfactory performance to near-duplicate retrieval, while still enjoying the merit of speed efficiency compared with other techniques.
Window Queries Over Data Streams, Jin Li
Window Queries Over Data Streams, Jin Li
Dissertations and Theses
Evaluating queries over data streams has become an appealing way to support various stream-processing applications. Window queries are commonly used in many stream applications. In a window query, certain query operators, especially blocking operators and stateful operators, appear in their windowed versions. Previous research work in evaluating window queries typically requires ordered streams and this order requirement limits the implementations of window operators and also carries performance penalties. This thesis presents efficient and flexible algorithms for evaluating window queries. We first present a new data model for streams, progressing streams, that separates stream progress from physical-arrival order. Then, we …
Modeling Video Hyperlinks With Hypergraph For Web Video Reranking, Hung-Khoon Tan, Chong-Wah Ngo, Xiao Wu
Modeling Video Hyperlinks With Hypergraph For Web Video Reranking, Hung-Khoon Tan, Chong-Wah Ngo, Xiao Wu
Research Collection School Of Computing and Information Systems
In this paper, we investigate a novel approach of exploiting visual-duplicates for web video reranking using hypergraph. Current graph-based reranking approaches consider mainly the pair-wise linking of keyframes and ignore reliability issues that are inherent in such representation. We exploit higher order relation to overcome the issues of missing links in visual-duplicate keyframes and in addition identify the latent relationships among keyframes. Based on hypergraph, we consider two groups of video threads: visual near-duplicate threads and story threads, to hyperlink web videos and describe the higher order information existing in video content. To facilitate reranking using random walk algorithm, the …
Using Timed-Release Cryptography To Mitigate Preservation Risk Of Embargo Periods, Rabia Haq
Using Timed-Release Cryptography To Mitigate Preservation Risk Of Embargo Periods, Rabia Haq
Computer Science Theses & Dissertations
This research defines Time-Locked Embargo, a framework designed to mitigate the Preservation Risk Interval: the preservation risk associated with embargoed scholarly material. Due to temporary access restrictions, embargoed data cannot be distributed freely and thus preserved via data refreshing during the embargo time interval. A solution to mitigate the risk of data loss has been developed by suggesting a data dissemination framework that allows data refreshing of encrypted instances of embargoed content in an open, unrestricted scholarly community. This framework has been developed by exploiting implementations of existing technologies to"time-lock" data using Timed-Release Cryptology (TRC) so that it can be …
Inhibition Of Linear Absorption In Opaque Materials Using Phase-Locked Harmonic Generation, Marco Centini, Vito Roppo, Eugenio Fazio, Federico Pettazzi, Concita Sibilia, Joseph W. Haus, John V. Foreman, Neset Akozbek, Mark J. Bloemer, Michael Scalora
Inhibition Of Linear Absorption In Opaque Materials Using Phase-Locked Harmonic Generation, Marco Centini, Vito Roppo, Eugenio Fazio, Federico Pettazzi, Concita Sibilia, Joseph W. Haus, John V. Foreman, Neset Akozbek, Mark J. Bloemer, Michael Scalora
Electrical and Computer Engineering Faculty Publications
We theoretically predict and experimentally demonstrate inhibition of linear absorption for phase and group velocity mismatched second- and third-harmonic generation in strongly absorbing materials, GaAs, in particular, at frequencies above the absorption edge.
A 100-fs pump pulse tuned to 1300 nm generates 650 and 435 nm second- and third-harmonic pulses that propagate across a 450−μm-thick GaAs substrate without being absorbed.
We attribute this to a phase-locking mechanism that causes the pump to trap the harmonics and to impress on them its dispersive properties.