Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Data management (4)
- 3D modeling (2)
- Cretan Hieroglyph (2)
- Cybersecurity (2)
- Data preservation (2)
-
- Digital forensics (2)
- Linear A (2)
- Linear B (2)
- Marketing (2)
- Network forensics (2)
- PhotoScan (2)
- Photogrammetry (2)
- Academic libraries (1)
- Acrophonic principle (1)
- Air gaps (1)
- Android (1)
- Android forensics (1)
- Application security testing (1)
- Apps (1)
- Attribution (1)
- Audio encoding (1)
- Autonomous systems (1)
- Bandwidth (1)
- Bibliographic instruction (1)
- Bibliography (1)
- Blogging (1)
- Bootstrap (1)
- CSS3 (1)
- Cloud computing (1)
- Collection development (1)
- Publication
-
- Electrical & Computer Engineering and Computer Science Faculty Publications (4)
- All Faculty Scholarship (3)
- CSE Conference and Workshop Papers (2)
- Publications and Research (2)
- Research Collection School Of Computing and Information Systems (2)
-
- Computational Modeling & Simulation Engineering Faculty Publications (1)
- Electrical and Computer Engineering: Graduate Student Scholarship (1)
- Honors Scholar Theses (1)
- January 23, 2015: Storm Surge Modeling Tools for Planning and Response (1)
- Library Faculty Publications (1)
- Published Works (1)
- Sprague Library Scholarship and Creative Works (1)
- The Social Life of Big Data Symposium (1)
- UConn Library Presentations (1)
- Visual Communications and Technology Education Faculty Publications (1)
Articles 1 - 23 of 23
Full-Text Articles in Computer Engineering
Whatsapp Network Forensics: Decrypting And Understanding The Whatsapp Call Signaling Messages, Filip Karpisek, Ibrahim Baggili, Frank Breitinger
Whatsapp Network Forensics: Decrypting And Understanding The Whatsapp Call Signaling Messages, Filip Karpisek, Ibrahim Baggili, Frank Breitinger
Electrical & Computer Engineering and Computer Science Faculty Publications
WhatsApp is a widely adopted mobile messaging application with over 800 million users. Recently, a calling feature was added to the application and no comprehensive digital forensic analysis has been performed with regards to this feature at the time of writing this paper. In this work, we describe how we were able to decrypt the network traffic and obtain forensic artifacts that relate to this new calling feature which included the: a) WhatsApp phone numbers, b) WhatsApp server IPs, c) WhatsApp audio codec (Opus), d) WhatsApp call duration, and e) WhatsApp's call termination. We explain the methods and tools used …
A Computational Translation Of The Phaistos Disk, Peter Revesz
A Computational Translation Of The Phaistos Disk, Peter Revesz
CSE Conference and Workshop Papers
For over a century the text of the Phaistos Disk remained an enigma without a convincing translation. This paper presents a novel semi-automatic translation method that uses for the first time a recently discovered connection between the Phaistos Disk symbols and other ancient scripts, including the Old Hungarian alphabet. The connection between the Phaistos Disk script and the Old Hungarian alphabet suggested the possibility that the Phaistos Disk language may be related to Proto-Finno-Ugric, Proto-Ugric, or Proto-Hungarian. Using words and suffixes from those languages, it is possible to translate the Phaistos Disk text as an ancient sun hymn, possibly connected …
Professor Frank Breitinger's Full Bibliography, Frank Breitinger
Professor Frank Breitinger's Full Bibliography, Frank Breitinger
Electrical & Computer Engineering and Computer Science Faculty Publications
No abstract provided.
A Computational Study Of The Evolution Of Cretan And Related Scripts, Peter Revesz
A Computational Study Of The Evolution Of Cretan And Related Scripts, Peter Revesz
CSE Conference and Workshop Papers
Crete was the birthplace of several ancient writings, including the Cretan Hieroglyphs, the Linear A and the Linear B scripts. Out of these three only Linear B is deciphered. The sound values of the Cretan Hieroglyph and the Linear A symbols are unknown and attempts to reconstruct them based on Linear B have not been fruitful. In this paper, we compare the ancient Cretan scripts with four other Mediterranean and Black Sea scripts, namely Phoenician, South Arabic, Greek and Old Hungarian. We provide a computational study of the evolution of the three Cretan and four other scripts. This study encompasses …
Social Signal Processing For Real-Time Situational Understanding: A Vision And Approach, Kasthuri Jeyarajah, Shuchao Yao, Raghava Muthuraju, Archan Misra, Geeth De Mel, Julie Skipper, Tarek Abdelzaher, Michael Kolodny
Social Signal Processing For Real-Time Situational Understanding: A Vision And Approach, Kasthuri Jeyarajah, Shuchao Yao, Raghava Muthuraju, Archan Misra, Geeth De Mel, Julie Skipper, Tarek Abdelzaher, Michael Kolodny
Research Collection School Of Computing and Information Systems
The US Army Research Laboratory (ARL) and the Air Force Research Laboratory (AFRL) have established a collaborative research enterprise referred to as the Situational Understanding Research Institute (SURI). The goal is to develop an information processing framework to help the military obtain real-time situational awareness of physical events by harnessing the combined power of multiple sensing sources to obtain insights about events and their evolution. It is envisioned that one could use such information to predict behaviors of groups, be they local transient groups (e.g., protests) or widespread, networked groups, and thus enable proactive prevention of nefarious activities. This paper …
Practical Guidance For Integrating Data Management Into Long-Term Ecological Monitoring Projects, Robert D. Sutter, Susan Wainscott, John R. Boetsch, Craig Palmer, David J. Rugg
Practical Guidance For Integrating Data Management Into Long-Term Ecological Monitoring Projects, Robert D. Sutter, Susan Wainscott, John R. Boetsch, Craig Palmer, David J. Rugg
Library Faculty Publications
Long-term monitoring and research projects are essential to understand ecological change and the effectiveness of management activities. An inherent characteristic of long-term projects is the need for consistent data collection over time, requiring rigorous attention to data management and quality assurance. Recent papers have provided broad recommendations for data management; however, practitioners need more detailed guidance and examples. We present general yet detailed guidance for the development of comprehensive, concise, and effective data management for monitoring projects. The guidance is presented as a graded approach, matching the scale of data management to the needs of the organization and the complexity …
The Social Life Of Big Data - Pawsey Resources, Luke Edwards
The Social Life Of Big Data - Pawsey Resources, Luke Edwards
The Social Life of Big Data Symposium
The presentation covers the supercomputing facilities and services available at the Pawsey Supercomputing Centre, Western Australia.
The Pawsey Supercomputing Centre is an unincorporated joint venture between CSIRO, Curtin University, Edith Cowan University, Murdoch University and the University of Western Australia and is supported by the Western Australian Government.
Fundamentals Of Library Instruction, Darren Sweeper
Fundamentals Of Library Instruction, Darren Sweeper
Sprague Library Scholarship and Creative Works
No abstract provided.
Presentation On Evaluating The Creation And Preservation Challenges Of Photogrammetry-Based 3d Models, Michael J. Bennett
Presentation On Evaluating The Creation And Preservation Challenges Of Photogrammetry-Based 3d Models, Michael J. Bennett
UConn Library Presentations
No abstract provided.
Evaluating The Creation And Preservation Challenges Of Photogrammetry-Based 3d Models, Michael J. Bennett
Evaluating The Creation And Preservation Challenges Of Photogrammetry-Based 3d Models, Michael J. Bennett
Published Works
Though the roots of photogrammetry can be traced back to photography’s earliest days, only recent advances in both digital technology and software applications have put the possibilities of 3D modeling from 2D source images in the hands of the greater cultural heritage community. The possibilities of such 3D digital rendering are many. With these possibilities come unique digital preservation challenges. This study explores basic close-range photogrammetry as applied to sample archival objects. Additionally, the latest BagIt and ZIP-based bundling formats along with repository-based solutions are also surveyed as potential 3D data management and archiving aggregators for resulting 3D models.
Design, Programming, And User-Experience, Kaila G. Manca
Design, Programming, And User-Experience, Kaila G. Manca
Honors Scholar Theses
This thesis is a culmination of my individualized major in Human-Computer Interaction. As such, it showcases my knowledge of design, computer engineering, user-experience research, and puts into practice my background in psychology, com- munications, and neuroscience.
I provided full-service design and development for a web application to be used by the Digital Media and Design Department and their students.This process involved several iterations of user-experience research, testing, concepting, branding and strategy, ideation, and design. It lead to two products.
The first product is full-scale development and optimization of the web appli- cation.The web application adheres to best practices. It was …
Cloud Computing, Contractibility, And Network Architecture, Christopher S. Yoo
Cloud Computing, Contractibility, And Network Architecture, Christopher S. Yoo
All Faculty Scholarship
The emergence of the cloud is heightening the demands on the network in terms of bandwidth, ubiquity, reliability, latency, and route control. Unfortunately, the current architecture was not designed to offer full support for all of these services or to permit money to flow through it. Instead of modifying or adding specific services, the architecture could redesigned to make Internet services contractible by making the relevant information associated with these services both observable and verifiable. Indeed, several on-going research programs are exploring such strategies, including the NSF’s NEBULA, eXpressive Internet Architecture (XIA), ChoiceNet, and the IEEE’s Intercloud projects.
Using Support Vector Machine Ensembles For Target Audience Classification On Twitter, Siaw Ling Lo, Raymond Chiong, David Cornforth
Using Support Vector Machine Ensembles For Target Audience Classification On Twitter, Siaw Ling Lo, Raymond Chiong, David Cornforth
Research Collection School Of Computing and Information Systems
The vast amount and diversity of the content shared on social media can pose a challenge for any business wanting to use it to identify potential customers. In this paper, our aim is to investigate the use of both unsupervised and supervised learning methods for target audience classification on Twitter with minimal annotation efforts. Topic domains were automatically discovered from contents shared by followers of an account owner using Twitter Latent Dirichlet Allocation (LDA). A Support Vector Machine (SVM) ensemble was then trained using contents from different account owners of the various topic domains identified by Twitter LDA. Experimental results …
Agenda, Hr Adaptation Forum
Agenda, Hr Adaptation Forum
January 23, 2015: Storm Surge Modeling Tools for Planning and Response
No abstract provided.
Automated Technique For Real-Time Production Of Lifelike Animations Of American Sign Language, John Mcdonald, Rosalee Wolfe, Jerry C. Schnepp, Julie Hochgesang, Diana Gorman Jamrozik, Marie Stumbo, Larwan Berke, Melissa Bialek, Farah Thomas
Automated Technique For Real-Time Production Of Lifelike Animations Of American Sign Language, John Mcdonald, Rosalee Wolfe, Jerry C. Schnepp, Julie Hochgesang, Diana Gorman Jamrozik, Marie Stumbo, Larwan Berke, Melissa Bialek, Farah Thomas
Visual Communications and Technology Education Faculty Publications
Generating sentences from a library of signs implemented through a sparse set of key frames derived from the segmental structure of a phonetic model of ASL has the advantage of flexibility and efficiency, but lacks the lifelike detail of motion capture. These difficulties are compounded when faced with real-time generation and display. This paper describes a technique for automatically adding realism without the expense of manually animating the requisite detail. The new technique layers transparently over and modifies the primary motions dictated by the segmental model, and does so with very little computational cost, enabling real-time production and display. The …
Merging Two Worlds: Agent-Based Simulation Methods For Autonomous Systems, Andreas Tolk
Merging Two Worlds: Agent-Based Simulation Methods For Autonomous Systems, Andreas Tolk
Computational Modeling & Simulation Engineering Faculty Publications
This chapter recommends the increased use of agent-based simulation methods to support the design, development, testing, and operational use of autonomous systems. This recommendation is motivated by deriving taxonomies for intelligent software agents and autonomous robotic systems from the public literature, which shows their similarity: intelligent software agents can be interpreted as the virtual counterparts of autonomous robotic systems. This leads to examples of how simulation can be used to significantly improve autonomous system research and development in selected use cases. The chapter closes with observations on the operational effects of possible emergent behaviour and the need to align the …
Framing The Question, "Who Governs The Internet?", Robert J. Domanski
Framing The Question, "Who Governs The Internet?", Robert J. Domanski
Publications and Research
There remains a widespread perception among both the public and elements of academia that the Internet is “ungovernable”. However, this idea, as well as the notion that the Internet has become some type of cyber-libertarian utopia, is wholly inaccurate. Governments may certainly encounter tremendous difficulty in attempting to regulate the Internet, but numerous types of authority have nevertheless become pervasive. So who, then, governs the Internet? This book will contend that the Internet is, in fact, being governed, that it is being governed by specific and identifiable networks of policy actors, and that an argument can be made as to …
Using Robots As Therapeutic Agents To Teach Children With Autism Recognize Facial Expression, Seyedmohammad Mavadati, Huanghao Feng, Peyten B. Sanger, S. Silver, Anibal Gutierrez, Mohammad H. Mahoor
Using Robots As Therapeutic Agents To Teach Children With Autism Recognize Facial Expression, Seyedmohammad Mavadati, Huanghao Feng, Peyten B. Sanger, S. Silver, Anibal Gutierrez, Mohammad H. Mahoor
Electrical and Computer Engineering: Graduate Student Scholarship
Background: Recognizing and mimicking facial expressions are important cues for building great rapport and relationship in human-human communication. Individuals with Autism Spectrum Disorder (ASD) have often deficits in recognizing and mimicking social cues, such as facial expressions. In the last decade several studies have shown that individuals with ASD have superior engagement toward objects and particularly robots (i.e. humanoid and non-humanoid). However, majority of the studies have focused on investigating robot’s appearances and the engineering design concepts and very few research have been done on the effectiveness of robots in therapeutic and treatment applications. In fact, the critical question that …
An Empirical Comparison Of Widely Adopted Hash Functions In Digital Forensics: Does The Programming Language And Operating System Make A Difference?, Satyendra Gurjar, Ibrahim Baggili, Frank Breitinger, Alice E. Fischer
An Empirical Comparison Of Widely Adopted Hash Functions In Digital Forensics: Does The Programming Language And Operating System Make A Difference?, Satyendra Gurjar, Ibrahim Baggili, Frank Breitinger, Alice E. Fischer
Electrical & Computer Engineering and Computer Science Faculty Publications
Hash functions are widespread in computer sciences and have a wide range of applications such as ensuring integrity in cryptographic protocols, structuring database entries (hash tables) or identifying known files in forensic investigations. Besides their cryptographic requirements, a fundamental property of hash functions is efficient and easy computation which is especially important in digital forensics due to the large amount of data that needs to be processed when working on cases. In this paper, we correlate the runtime efficiency of common hashing algorithms (MD5, SHA-family) and their implementation. Our empirical comparison focuses on C-OpenSSL, Python, Ruby, Java on Windows and …
Network And Device Forensic Analysis Of Android Social-Messaging Applications, Daniel Walnycky, Ibrahim Baggili, Andrew Marrington, Jason Moore, Frank Breitinger
Network And Device Forensic Analysis Of Android Social-Messaging Applications, Daniel Walnycky, Ibrahim Baggili, Andrew Marrington, Jason Moore, Frank Breitinger
Electrical & Computer Engineering and Computer Science Faculty Publications
In this research we forensically acquire and analyze the device-stored data and network traffic of 20 popular instant messaging applications for Android. We were able to reconstruct some or the entire message content from 16 of the 20 applications tested, which reflects poorly on the security and privacy measures employed by these applications but may be construed positively for evidence collection purposes by digital forensic practitioners. This work shows which features of these instant messaging applications leave evidentiary traces allowing for suspect data to be reconstructed or partially reconstructed, and whether network forensics or device forensics permits the reconstruction of …
Mobile Apps In Collection Development: Supporting A Mobile Learning Environment, Stefanie Havelka, Rebecca Arzola
Mobile Apps In Collection Development: Supporting A Mobile Learning Environment, Stefanie Havelka, Rebecca Arzola
Publications and Research
We will discuss our rationale and thoughts on why we believe mobile apps should be part of a library’s collection development policy. An updated policy with apps encourages a mobile learning environment that is technologically diverse while being holistically supportive of its users and research.
Cyber Espionage Or Cyber War?: International Law, Domestic Law, And Self-Protective Measures, Christopher S. Yoo
Cyber Espionage Or Cyber War?: International Law, Domestic Law, And Self-Protective Measures, Christopher S. Yoo
All Faculty Scholarship
Scholars have spent considerable effort determining how the law of war (particularly jus ad bellum and jus in bello) applies to cyber conflicts, epitomized by the Tallinn Manual on the International Law Applicable to Cyber Warfare. Many prominent cyber operations fall outside the law of war, including the surveillance programs that Edward Snowden has alleged were conducted by the National Security Agency, the distributed denial of service attacks launched against Estonia and Georgia in 2007 and 2008, the 2008 Stuxnet virus designed to hinder the Iranian nuclear program, and the unrestricted cyber warfare described in the 1999 book by …
Moore’S Law, Metcalfe’S Law, And The Theory Of Optimal Interoperability, Christopher S. Yoo
Moore’S Law, Metcalfe’S Law, And The Theory Of Optimal Interoperability, Christopher S. Yoo
All Faculty Scholarship
Many observers attribute the Internet’s success to two principles: Moore’s Law and Metcalfe’s Law. These precepts are often cited to support claims that larger networks are inevitably more valuable and that costs in a digital environment always decrease. This Article offers both a systematic description of both laws and then challenges the conventional wisdom by exploring their conceptual limitations. It also explores how alternative mechanisms, such as gateways and competition, can permit the realization benefits typically attributed to Moore’s Law and Metcalfe’s Law without requiring increases in network size.