Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Data mining (2)
- Security (2)
- Social media (2)
- Academic libraries; Automation; Discovery; Evaluation; Information retrieval; Information storage and retrieval systems; Online library catalogs – Evaluation; Survey; Web scale discovery (1)
- Agent-based modeling (1)
-
- Bandwidth (1)
- Blogs (1)
- Broadband (1)
- CAT detect (1)
- Cloud Computing (1)
- Cloud Forensic Capability (1)
- Cloud Forensics (1)
- Cloud bursting (1)
- Comments analysis (1)
- Communication networks (1)
- Computa- tional social science (1)
- Content analysis (1)
- Digg (1)
- Digital Forensics (1)
- Digital humanities (1)
- Disaster recovery (1)
- Diversity (1)
- Emotional speech (1)
- Event correlation (1)
- Facebook (1)
- Fragmentation (1)
- Grid computing (1)
- Happened-before (1)
- IaaS (1)
- InfoExtractor (1)
- Publication
-
- JITP 2011: The Future of Computational Social Science (7)
- All Faculty Scholarship (3)
- Electrical & Computer Engineering and Computer Science Faculty Publications (2)
- Articles, Chapters and Online Publications (1)
- Conference papers (1)
-
- Department of English: Dissertations, Theses, and Student Research (1)
- Library Faculty Publications (1)
- Management, Entrepreneurship and Technology Faculty Publications (1)
- School of Information Sciences -- Faculty Publications and Other Works (1)
- Visual Communications and Technology Education Faculty Publications (1)
- WKU Archives Records (1)
Articles 1 - 20 of 20
Full-Text Articles in Computer Engineering
Building Effective Ontology For Semantic Web: A Discussion Based On Practical Examples, Tianmu Zhang
Building Effective Ontology For Semantic Web: A Discussion Based On Practical Examples, Tianmu Zhang
School of Information Sciences -- Faculty Publications and Other Works
The study aims to investigate semantic web and create useful ontology as a teaching and educational tool for others interested in learning more about Semantic web. This paper discussed several emerging issues about the semantic web and ontology building. This paper combines ontology implementation examples with research topics to identify current issues and potential solution in both application and theoretical level. It concludes that although semantic web and ontology technology are not mature enough currently, there is a clear tendency for them to be integrated into various applications to exert synergies.
News Media Environment, Selective Perception, And The Survival Of Preference Diversity Within Communication Networks, Frank C.S. Liu, Paul E. Johnson
News Media Environment, Selective Perception, And The Survival Of Preference Diversity Within Communication Networks, Frank C.S. Liu, Paul E. Johnson
JITP 2011: The Future of Computational Social Science
There is a natural tension between the effects on public opinion of social networks and the news media. It is widely believed that social networks tend to harmonize opinions within them, but the presence of media may accentuate diversity by inserting discordant messages. On the other hand, in a totalitarian state where the government controls the media, social networks may mitigate the homogenizing pressure of a regime’s propaganda. The tendency of opinion to follow the “official line” may be mitigated because opponents of the government interact on a personal level and bolster one another’s views. This paper employs agent-based modeling—an …
Using Textual Features To Predict Popular Content On Digg, Paul H. Miller
Using Textual Features To Predict Popular Content On Digg, Paul H. Miller
Department of English: Dissertations, Theses, and Student Research
Over the past few years, collaborative rating sites, such as Netflix, Digg and Stumble, have become increasingly prevalent sites for users to find trending content. I used various data mining techniques to study Digg, a social news site, to examine the influence of content on popularity. What influence does content have on popularity, and what influence does content have on users’ decisions? Overwhelmingly, prior studies have consistently shown that predicting popularity based on content is difficult and maybe even inherently impossible. The same submission can have multiple outcomes and content neither determines popularity, nor individual user decisions. My results show …
Cloud Computing: Architectural And Policy Implications, Christopher S. Yoo
Cloud Computing: Architectural And Policy Implications, Christopher S. Yoo
All Faculty Scholarship
Cloud computing has emerged as perhaps the hottest development in information technology. Despite all of the attention that it has garnered, existing analyses focus almost exclusively on the issues that surround data privacy without exploring cloud computing’s architectural and policy implications. This article offers an initial exploratory analysis in that direction. It begins by introducing key cloud computing concepts, such as service-oriented architectures, thin clients, and virtualization, and discusses the leading delivery models and deployment strategies that are being pursued by cloud computing providers. It next analyzes the economics of cloud computing in terms of reducing costs, transforming capital expenditures …
Rough Consensus And Running Code: Integrating Engineering Principles Into Internet Policy Debates, Christopher S. Yoo
Rough Consensus And Running Code: Integrating Engineering Principles Into Internet Policy Debates, Christopher S. Yoo
All Faculty Scholarship
This is the introduction to a symposium issue for a conference designed to bring the engineering community, policymakers, legal academics, and industry participants together in an attempt to provide policymakers with a better understanding of the Internet’s technical aspects and to explore emerging issues of particular importance to current broadband policy.
Avatar To Depict Sign Language: Building From Reusable Hand Animation, Rosalee Wolfe, John Mcdonald, Jerry C. Schnepp
Avatar To Depict Sign Language: Building From Reusable Hand Animation, Rosalee Wolfe, John Mcdonald, Jerry C. Schnepp
Visual Communications and Technology Education Faculty Publications
No abstract provided.
Infoextractor – A Tool For Social Media Data Mining, Chirag Shah, Charles File
Infoextractor – A Tool For Social Media Data Mining, Chirag Shah, Charles File
JITP 2011: The Future of Computational Social Science
We present InfoExtractor, a web-based tool for collecting data and metadata from focused social media content. InfoExtractor then provides this data in various structured and unstructured formats for easy manipulation and analysis. The tool allows social science researchers to easily collect data for quantitative analysis, and is designed to deliver data from popular and influential social media sites in a useful and easy to access way. InfoExtractor was designed to replace traditional means of content aggregation, such as page scraping and brute- force copying.
Researching Real-World Web Use With Roxy, A Research Proxy, Ericka Menchen-Trevino, Chris Karr
Researching Real-World Web Use With Roxy, A Research Proxy, Ericka Menchen-Trevino, Chris Karr
JITP 2011: The Future of Computational Social Science
Outside of a lab environment, it has been difficult for researchers to collect both behavioral and self-reported Web-use data from the same participants. To address this challenge we created Roxy, open source software that collects real-world Web-use data with participants’ informed consent. Roxy gathers Web log data as well as the text and HTML code of each page visited by participants. We describe Roxy’s data gathering capabilities and search functions and then illustrate how we used the software in a multi-method study. The use case examines selective exposure to political communication during the November 2010 U.S. general election campaign.
Tradeoffs In Accuracy And Efficiency In Supervised Learning Methods, Loren Collingwood, John Wilkerson
Tradeoffs In Accuracy And Efficiency In Supervised Learning Methods, Loren Collingwood, John Wilkerson
JITP 2011: The Future of Computational Social Science
Text is becoming a central source of data for social science research. With advances in digitization and open records practices, the central challenge has in large part shifted away from availability to usability. Automated text classification methodologies are becoming increasingly important within political science because they hold the promise of substantially reducing the costs of converting text to data for a variety of tasks. In this paper, we consider a number of questions of interest to prospective users of supervised learning methods, which are appropriate to classification tasks where known categories are applied. For the right task, supervised learning methods …
Facilitating Encounters With Political Difference: Engaging Voters With The Living Voters Guide, Deen G. Freelon, Travis Kriplean, John Morgan, W. Lance Bennett, Alan Borning
Facilitating Encounters With Political Difference: Engaging Voters With The Living Voters Guide, Deen G. Freelon, Travis Kriplean, John Morgan, W. Lance Bennett, Alan Borning
JITP 2011: The Future of Computational Social Science
Unlike 20th-century mass media, the Internet requires self-selection of content by its very nature. This has raised the normative concern that users may opt to encounter only political information and perspectives that accord with their preexisting views. This study examines the different ways that voters appropriated a new, purpose-built online engagement platform to engage with a wide variety of political opinions and arguments. In a deployment aimed at helping Washington state citizens make their 2010 election decisions, we find that users take significant advantage of three key opportunities to engage with political diversity: reading, acknowledging, and writing arguments on both …
Politics 2.0 With Facebook – Collecting And Analyzing Public Comments On Facebook For Studying Political Discourses, Chirag Shah, Tayebeh Yazdani Nia
Politics 2.0 With Facebook – Collecting And Analyzing Public Comments On Facebook For Studying Political Discourses, Chirag Shah, Tayebeh Yazdani Nia
JITP 2011: The Future of Computational Social Science
Analyzing publicly available content on various social media sites such as YouTube and Twitter, as well as social network sites such as Facebook, has become an increasingly popular method for studying socio-political issues. Such public-contributed content, primarily available as comments, let people express their opinions and sentiments on a given topic, news-story, or post, while allowing social and political scientists to extend their analysis of a political discourse to social sphere. We recognize the importance of Facebook in such analysis and present several approaches and observations of collecting and analyzing public comments from it. In particular, we demonstrate what it …
An Automated Snowball Census Of The Political Web, Abe Gong
An Automated Snowball Census Of The Political Web, Abe Gong
JITP 2011: The Future of Computational Social Science
This paper solves a persistent methodological problem for social scientists studying the political web: representative sampling. Virtu- ally all existing studies of the political web are based on incomplete samples, and therefore lack generalizability. In this paper, I combine methods from computer science and sampling theory to conduct an automated snowball census of the political web and constructs an all- but-complete index of English political websites. I check the robust- ness of this index, use it to generate descriptive statistics for the entire political web, and demonstrate that studies based on ad hoc sampling strategies are likely to be biased …
Cat Detect (Computer Activity Timeline Detection): A Tool For Detecting Inconsistency In Computer Activity Timelines, Andrew Marrington, Ibrahim Baggili, George Mohay, Andrew Clark
Cat Detect (Computer Activity Timeline Detection): A Tool For Detecting Inconsistency In Computer Activity Timelines, Andrew Marrington, Ibrahim Baggili, George Mohay, Andrew Clark
Electrical & Computer Engineering and Computer Science Faculty Publications
The construction of timelines of computer activity is a part of many digital investigations. These timelines of events are composed of traces of historical activity drawn from system logs and potentially from evidence of events found in the computer file system. A potential problem with the use of such information is that some of it may be inconsistent and contradictory thus compromising its value. This work introduces a software tool (CAT Detect) for the detection of inconsistency within timelines of computer activity. We examine the impact of deliberate tampering through experiments conducted with our prototype software tool. Based on the …
Understanding The Influence Of Blog On The Development Of Social Capital, Reza Vaezi, Gholamreza Torkzadeh, Jerry Cha-Jan Chang
Understanding The Influence Of Blog On The Development Of Social Capital, Reza Vaezi, Gholamreza Torkzadeh, Jerry Cha-Jan Chang
Management, Entrepreneurship and Technology Faculty Publications
The rapid use and application of blogs in diverse areas such as education, marketing, journalism, and human resource management in recent years underlines the need for a better understanding of the impact of this new technology on social capital. Social capital reflects the norm of reciprocity and the level of trust among individuals who connect, interact, and benefit from one another. Blog is expected to influence the extent and the scope of this interaction by providing new means of networking among people. This paper examines the relationship between blog use and social capital and reports on the results of an …
Investigations Into Library Web Scale Discovery Services, Jason Vaughan
Investigations Into Library Web Scale Discovery Services, Jason Vaughan
Library Faculty Publications
Web scale discovery services for libraries provide deep discovery to a library’s local and licensed content, and represent an evolution, perhaps a revolution, for end user information discovery as pertains to library collections. This article frames the topic of Web scale discovery, and begins by illuminating Web scale discovery from an academic library’s perspective – that is, the internal perspective seeking widespread staff participation in the discovery conversation. This included the creation of a Discovery Task Force, a group which educated library staff, conducted internal staff surveys, and gathered observations from early adopters. The article next addresses the substantial research …
Obtaining Speech Assets For Judgement Analysis On Low-Pass Filtered Emotional Speech, John Snel, Charlie Cullen
Obtaining Speech Assets For Judgement Analysis On Low-Pass Filtered Emotional Speech, John Snel, Charlie Cullen
Conference papers
Investigating the emotional content in speech from acoustic characteristics requires separating the semantic con- tent from the acoustic channel. For natural emotional speech, a widely used method to separate the two channels is the use of cue masking. Our objective is to investigate the use of cue masking in non-acted emotional speech by analyzing the extent to which filtering impacts the perception of emotional content of the modified speech material. However, obtaining a corpus of emotional speech can be quite difficult whereby verifying the emotional content is an issue thoroughly discussed. Currently, speech research is showing a tendency toward constructing …
Ua3/9/2 I.T. Division Annual Report + Tactical Plan, Wku Information Technology
Ua3/9/2 I.T. Division Annual Report + Tactical Plan, Wku Information Technology
WKU Archives Records
Annual report of WKU Information Technology Division submitted to WKU President Gary Ransdell. Report is housed in UA3/9/2 Subject Files.
Survey On Cloud Forensics And Critical Criteria For Cloud Forensic Capability: A Preliminary Analysis, Keyun Ruan, Ibrahim Baggili, Joe Carthy, Tahar Kechadi
Survey On Cloud Forensics And Critical Criteria For Cloud Forensic Capability: A Preliminary Analysis, Keyun Ruan, Ibrahim Baggili, Joe Carthy, Tahar Kechadi
Electrical & Computer Engineering and Computer Science Faculty Publications
In this paper we present the current results and analysis of the survey “Cloud forensics and critical criteria for cloud forensic capability” carried out towards digital forensic experts and practitioners. This survey was created in order to gain a better understanding on some of the key questions of the new field - cloud forensics - before further research and development. We aim to understand concepts such as its definition, the most challenging issues, most valuable research directions, and the critical criteria for cloud forensic capability.
Technology Management Trends In Law Schools, Carol A. Watson, Larry Reeves
Technology Management Trends In Law Schools, Carol A. Watson, Larry Reeves
Articles, Chapters and Online Publications
Discusses the role of librarians in law school technology management and analyzes technology staffing survey results for 2002, 2006, and 2010. While survey results indicate a trend toward establishing separate information technology departments within law schools, librarians are and will continue to be actively involved in law school technology.
Promoting The Buildout Of New Networks Vs. Compelling Access To The Monopoly Loop: A Clash Of Regulatory Paradigms, Christopher S. Yoo
Promoting The Buildout Of New Networks Vs. Compelling Access To The Monopoly Loop: A Clash Of Regulatory Paradigms, Christopher S. Yoo
All Faculty Scholarship
No abstract provided.