Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Physical Sciences and Mathematics (252)
- Computer Sciences (234)
- Electrical and Computer Engineering (69)
- Computer and Systems Architecture (31)
- Digital Communications and Networking (30)
-
- Social and Behavioral Sciences (20)
- Systems and Communications (17)
- Data Storage Systems (14)
- Electrical and Electronics (14)
- Other Computer Engineering (13)
- Robotics (13)
- Other Electrical and Computer Engineering (12)
- Communication (11)
- Optics (11)
- Physics (11)
- Electromagnetics and Photonics (10)
- Databases and Information Systems (9)
- Mechanical Engineering (9)
- Public Affairs, Public Policy and Public Administration (9)
- Science and Technology Studies (9)
- Computational Engineering (8)
- Signal Processing (8)
- Software Engineering (8)
- Graphics and Human Computer Interfaces (7)
- Mathematics (7)
- Political Science (7)
- Biomedical Engineering and Bioengineering (6)
- Business (6)
- Institution
-
- Wright State University (154)
- University of Nebraska - Lincoln (68)
- University of Texas at El Paso (64)
- Washington University in St. Louis (19)
- Marquette University (17)
-
- Technological University Dublin (17)
- University of Massachusetts Amherst (14)
- Singapore Management University (13)
- University of Dayton (11)
- Old Dominion University (10)
- Portland State University (10)
- Connecticut College (7)
- Cleveland State University (5)
- University of Nevada, Las Vegas (5)
- University of Pennsylvania Carey Law School (4)
- University of Rhode Island (4)
- Western Kentucky University (4)
- Chapman University (3)
- Purdue University (3)
- University of New Mexico (3)
- Air Force Institute of Technology (2)
- Bowling Green State University (2)
- Morehead State University (2)
- Pace University (2)
- Syracuse University (2)
- University of New Haven (2)
- Virginia Commonwealth University (2)
- Western University (2)
- California Polytechnic State University, San Luis Obispo (1)
- DePaul University (1)
- Keyword
-
- Interval computations (6)
- Security (5)
- Engineering (4)
- Oceanography (4)
- Parallel processing (Electronic computers) (4)
-
- Western Kentucky University (4)
- Classification (3)
- Cooperative Relaying (3)
- Electronic data processing -- Distributed processing (3)
- Functional programming (Computer science) (3)
- Interval uncertainty (3)
- Latency (3)
- Ontology (3)
- Optimization (3)
- Privacy (3)
- Symmetries (3)
- Synchronization (3)
- Vehicular Networks (3)
- Wireless sensor networks (3)
- Bandwidth (2)
- Cloud Computing (2)
- Complex system (2)
- Complexity reduction (2)
- Computer programming (2)
- Cooperative diversity (2)
- Crawl (2)
- Cross Layer (2)
- DSmT (2)
- Data mining (2)
- Data structures (Computer science) (2)
- Publication
-
- Computer Science & Engineering Syllabi (154)
- Departmental Technical Reports (CS) (64)
- Department of Electrical and Computer Engineering: Faculty Publications (to 2015) (28)
- All Computer Science and Engineering Research (19)
- Electrical and Computer Engineering Faculty Publications (17)
-
- Electrical and Computer Engineering Faculty Research and Publications (17)
- Department of Computer Science and Engineering: Dissertations, Theses, and Student Research (14)
- Department of Electrical and Computer Engineering: Faculty Publications (13)
- Research Collection School Of Computing and Information Systems (13)
- Computer Science Faculty Publications (11)
- Computer Science Faculty Publications and Presentations (8)
- JITP 2011: The Future of Computational Social Science (7)
- Masters Theses 1911 - February 2014 (7)
- Computer and Electronics Engineering: Dissertations, Theses, and Student Research (6)
- Conference papers (6)
- Articles (5)
- All Faculty Scholarship (4)
- Computational Modeling & Simulation Engineering Faculty Publications (4)
- Conference Papers (4)
- Graduate School of Oceanography Faculty Publications (4)
- Branch Mathematics and Statistics Faculty and Staff Publications (3)
- Engineering Faculty Articles and Research (3)
- CSE Conference and Workshop Papers (2)
- Computer Science Publications (2)
- Cornerstone 3 Reports : Interdisciplinary Informatics (2)
- ENSI Informer Magazine Archive (2)
- Electrical & Computer Engineering Faculty Research (2)
- Electrical & Computer Engineering and Computer Science Faculty Publications (2)
- Electrical Engineering and Computer Science - All Scholarship (2)
- Electrical and Computer Engineering Publications (2)
Articles 451 - 467 of 467
Full-Text Articles in Computer Engineering
Near Optimal Rate Selection For Wireless Control Systems, Abusayeed Saifullah, Chengjie Wu, Paras Babu Tiwari, You Xu, Yong Fu, Chenyang Lu, Yixin Chen
Near Optimal Rate Selection For Wireless Control Systems, Abusayeed Saifullah, Chengjie Wu, Paras Babu Tiwari, You Xu, Yong Fu, Chenyang Lu, Yixin Chen
All Computer Science and Engineering Research
With the advent of industrial standards such as WirelessHART, process industries are now gravitating towards wireless control systems. Due to limited bandwidth in a wireless network shared by multiple control loops, it is critical to optimize the overall control performance. In this paper, we address the scheduling-control co-design problem of determining the optimal sampling rates of feedback control loops sharing a WirelessHART network. The objective is to minimize the overall control cost while ensuring that all data flows meet their end-to-end deadlines. The resulting constrained optimization based on existing delay bounds for WirelessHART networks is challenging since it is non-differentiable, …
Image Editing Style-Based Authorship Authentication, Chengcui Zhang, Wei-Bang Chen, Liping Zhou
Image Editing Style-Based Authorship Authentication, Chengcui Zhang, Wei-Bang Chen, Liping Zhou
College of Arts and Sciences Professional Work
This paper aims to provide an authorship identification framework that can provide added clues to online auction user profiling systems, the primary purpose of which is early detection and prevention of fraudulent behaviors such as account taken-over. This framework authenticates the authorship of product listing pictures in terms of their image editing styles, and it achieves this goal in three steps: (1) editing style distinction: using a Hough transform based edge clustering algorithm to differentiate between image editing styles created by the same seller, (2) editing style summarization: analyzing and encoding each distinctive image editing style into a template based …
A Midsummer Night’S Dream (With Flying Robots), Robin Murphy, Dylan Shell, Amy Guerin, Brittany Duncan, Benjamin Fine, Kevin Pratt, Takis Zourntos
A Midsummer Night’S Dream (With Flying Robots), Robin Murphy, Dylan Shell, Amy Guerin, Brittany Duncan, Benjamin Fine, Kevin Pratt, Takis Zourntos
School of Computing: Faculty Publications
Seven flying robot “fairies” joined human actors in the Texas A&M production of William Shakespeare’s A Midsummer Night’s Dream. The production was a collaboration between the departments of Computer Science and Engineering, Electrical and Computer Engineering, and Theater Arts. The collaboration was motivated by two assertions. First, that the performing arts have principles for creating believable agents that will transfer to robots. Second, the theater is a natural testbed for evaluating the response of untrained human groups (both actors and the audience) to robots interacting with humans in shared spaces, i.e., were believable agents created? The production used two types …
The Best Available Technology Standard, Lital Helman, Gideon Parchomovsky
The Best Available Technology Standard, Lital Helman, Gideon Parchomovsky
All Faculty Scholarship
Copyright liability for web-hosting will be a key determinant of the evolution of the Internet in years to come. Depending on their design, the legal rules that shape the liability of web-hosts can stunt the development of the Internet as a medium of expression or enhance it. Hence, adopting the optimal liability regime is a matter of crucial importance. This Article proposes a radical change in web-hosts’ copyright liability for illegal content posted by users. Our main thesis is that web-hosts’ liability should be guided by the “Best Available Technology” principle, according to which web-hosts that employ the best filtering …
Evidence Supporting Measure Of Similarity For Reducing The Complexity In Information Fusion, Florentin Smarandache, Jean Dezert, Xinde Li, Xinhan Huang
Evidence Supporting Measure Of Similarity For Reducing The Complexity In Information Fusion, Florentin Smarandache, Jean Dezert, Xinde Li, Xinhan Huang
Branch Mathematics and Statistics Faculty and Staff Publications
This paper presents a new method for reducing the number of sources of evidence to combine in order to reduce the complexity of the fusion processing. Such a complexity reduction is often required in many applications where the real-time constraint and limited computing resources are of prime importance. The basic idea consists in selecting, among all sources available, only a subset of sources of evidence to combine. The selection is based on an evidence supporting measure of similarity (ESMS) criterion which is an efficient generic tool for outlier sources identification and rejection. The ESMS between two sources of evidence can …
Development Of Visualization Facility At The Gis And Remote Sensing Core Lab, University Of Nevada, Las Vegas, Haroon Stephen, William J. Smith, Zhongwei Liu
Development Of Visualization Facility At The Gis And Remote Sensing Core Lab, University Of Nevada, Las Vegas, Haroon Stephen, William J. Smith, Zhongwei Liu
Public Policy and Leadership Faculty Presentations
Visualization using advanced computational and graphic equipment has become a standard way of present day research. Availability of low cost and fast processing units, high resolution displays with graphic processing units, and specialized software has brought complex visualization capabilities to an office desktop. Nevertheless, when dealing with large datasets such as, global climate, geospatial, and social data the office desktop falls short and calls for a centralized visualization facility with high end computing and graphics equipment.
Visualization Facility at GIS and Remote Sensing Core Lab would be a useful and important addition to the UNLV IT infrastructure. It would provide …
Detecting The Onset Of Dementia Using Context-Oriented Architecture, Basel Magableh, Nidal Albeiruti
Detecting The Onset Of Dementia Using Context-Oriented Architecture, Basel Magableh, Nidal Albeiruti
Articles
In the last few years, Aspect Oriented Software De- velopment (AOSD) and Context Oriented Software Development (COSD) have become interesting alternatives for the design and construction of self-adaptive software systems. An analysis of these technologies shows them all to employ the principle of the separation of concerns, Model Driven Architecture (MDA) and Component-based Software Development (CBSD) for building high quality of software systems. In general, the ultimate goal of these technologies is to be able to reduce development costs and effort, while improving the adaptability, and dependability of software systems. COSD, has emerged as a generic devel- opment paradigm towards …
Multi-Pose Face Recognition And Tracking System, Binu Muraleedharan Nair, Jacob Foytik, Richard Tompkins, Yakov Diskin, Theus Aspiras, Vijayan K. Asari
Multi-Pose Face Recognition And Tracking System, Binu Muraleedharan Nair, Jacob Foytik, Richard Tompkins, Yakov Diskin, Theus Aspiras, Vijayan K. Asari
Electrical and Computer Engineering Faculty Publications
We propose a real time system for person detection, recognition and tracking using frontal and profile faces. The system integrates face detection, face recognition and tracking techniques. The face detection algorithm uses both frontal face and profile face detectors by extracting the 'Haar' features and uses them in a cascade of boosted classifiers. The pose is determined from the face detection algorithm which uses a combination of profile and frontal face cascades and, depending on the pose, the face is compared with a particular set of faces having the same range for classification. The detected faces are recognized by projecting …
Designing, Understanding, And Analyzing Unconventional Computation: The Important Role Of Logic And Constructive Mathematics, Vladik Kreinovich
Designing, Understanding, And Analyzing Unconventional Computation: The Important Role Of Logic And Constructive Mathematics, Vladik Kreinovich
Departmental Technical Reports (CS)
In this paper, we explain why, in our opinion, logic and constructive mathematics are playing -- and should play -- an important role in the design, understanding, and analysis of unconventional computation.
Promoting The Buildout Of New Networks Vs. Compelling Access To The Monopoly Loop: A Clash Of Regulatory Paradigms, Christopher S. Yoo
Promoting The Buildout Of New Networks Vs. Compelling Access To The Monopoly Loop: A Clash Of Regulatory Paradigms, Christopher S. Yoo
All Faculty Scholarship
No abstract provided.
Accessible Rich Internet Applications: The Search Engine Challenge, Angela Kielthy
Accessible Rich Internet Applications: The Search Engine Challenge, Angela Kielthy
Conference papers
The perception that Rich Internet Applications (RIAs) and Accessible Rich Internet Applications (ARIAs) are inaccessible to search engines is perhaps one of the main factors that hinder their wider adoption by the web development community. Recent announcements that RIAs and ARIAs are becoming more search engine friendly is provoking web developers to look for further information and evidence that will support or refute these announcements.
This paper outlines research undertaken and tests performed to establish if RIAs and ARIAs developed using Adobe Flex are crawlable and indexable by the Google search engine by default.
The conclusion drawn from testing is …
Simulated Performance Intensity Functions, Andrew Hines, Naomi Harte
Simulated Performance Intensity Functions, Andrew Hines, Naomi Harte
Conference papers
Measuring speech intelligibility for different hearing aid fitting methods in a simulated environment would allow rapid prototyping and early design assessment. A simulated performance intensity function (SPIF) test methodology has been developed to allow experimentation using an auditory nerve model to predict listeners’ phoneme recognition. The test discriminates between normal hearing and progressively degrading levels of sensorineural hearing loss. Auditory nerve discharge patterns, presented as neurograms, can be subjectively ranked by visual inspection. Here, subjective inspection is substituted with an automated ranking using a new image quality metric that can quantify neurogram degradation in a consistent manner. This work reproduces …
Comparing Hearing Aid Algorithm Performance Using Simulated Performance Intensity Functions, Andrew Hines, Naomi Harte
Comparing Hearing Aid Algorithm Performance Using Simulated Performance Intensity Functions, Andrew Hines, Naomi Harte
Conference papers
Simulated performance intensity functions were used to quantitatively discriminate speech intelligibility through phoneme discrimination assessment. Listener test results for subjects with a wide range of sensorineural hearing losses were simulated using an auditory nerve model and compared to real listeners' unaided and aided performance. Simulations of NAL-RP and DSL 4.0 fitting algorithms were compared. Auditory nerve discharge patterns from the model were presented as neurograms. An automated ranking process was used to quantify neurogram degradation using a new measure, the Neurogram Similarity Index Measure (NSIM). The measure has previously been shown to correlate well in predictions of phoneme discrimination for …
Relation Liftings On Preorders And Posets, Marta Bílková, Alexander Kurz, Daniela Petrişan, Jiří Velebil
Relation Liftings On Preorders And Posets, Marta Bílková, Alexander Kurz, Daniela Petrişan, Jiří Velebil
Engineering Faculty Articles and Research
The category Rel(Set) of sets and relations can be described as a category of spans and as the Kleisli category for the powerset monad. A set-functor can be lifted to a functor on Rel(Set) iff it preserves weak pullbacks. We show that these results extend to the enriched setting, if we replace sets by posets or preorders. Preservation of weak pullbacks becomes preservation of exact lax squares. As an application we present Moss’s coalgebraic over posets.
Towards Nominal Formal Languages, Alexander Kurz, Tomoyuki Suzuki, Emilio Tuosto
Towards Nominal Formal Languages, Alexander Kurz, Tomoyuki Suzuki, Emilio Tuosto
Engineering Faculty Articles and Research
We introduce formal languages over infinite alphabets where words may contain binders.We define the notions of nominal language, nominal monoid, and nominal regular expressions. Moreover, we extend history-dependent automata (HD-automata) by adding stack, and study the recognisability of nominal languages.
Generic Trace Logics, Christian Kissig, Alexander Kurz
Generic Trace Logics, Christian Kissig, Alexander Kurz
Engineering Faculty Articles and Research
We combine previous work on coalgebraic logic with the coalgebraic traces semantics of Hasuo, Jacobs, and Sokolova.
Technology Management Trends In Law Schools, Carol A. Watson, Larry Reeves
Technology Management Trends In Law Schools, Carol A. Watson, Larry Reeves
Articles, Chapters and Online Publications
Discusses the role of librarians in law school technology management and analyzes technology staffing survey results for 2002, 2006, and 2010. While survey results indicate a trend toward establishing separate information technology departments within law schools, librarians are and will continue to be actively involved in law school technology.