Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Selected Works

2011

Selected Works

Discipline
Keyword
Publication
File Type

Articles 1 - 30 of 59

Full-Text Articles in Computer Engineering

New Frontiers In Ocean Exploration: The 2011 E/V Nautilus Field Season, K. Bell, R. Ballard, D. Coleman, C. Roman, M. Brennan, T. Turanli, M. Duman, S. Carey, P. Nomikou, M. Marani, M. Rosi, J. Austin, M. Canals, J. Karson, L. Mayer, Y. Makovsky Dec 2011

New Frontiers In Ocean Exploration: The 2011 E/V Nautilus Field Season, K. Bell, R. Ballard, D. Coleman, C. Roman, M. Brennan, T. Turanli, M. Duman, S. Carey, P. Nomikou, M. Marani, M. Rosi, J. Austin, M. Canals, J. Karson, L. Mayer, Y. Makovsky

Christopher N. Roman

In the summer of 2011, the Exploration Vessel NAUTILUS is undertaking a four-month expedition to the Black, Aegean and Mediterranean Seas, and North Atlantic Ocean. The primary goal of the NAUTILUS is to create a focus of international leadership for the development and integration of leading-edge technologies, educational programs, field operations, and public outreach programs for ocean exploration, in partnership with NOAA, National Geographic Society, Office of Naval Research, and other sponsors. To do so, the program uses a complement of deep submergence vehicle systems and “telepresence” technologies to engage scientists, educators and the public, both at sea and ashore, …


High Resolution Sea Floor Bathymetry Using High Frequency Multibeam Sonar And Structured Light Laser Imaging, C. Roman, G. Inglis, C. Smart, I. Vaughn, S. Carey Dec 2011

High Resolution Sea Floor Bathymetry Using High Frequency Multibeam Sonar And Structured Light Laser Imaging, C. Roman, G. Inglis, C. Smart, I. Vaughn, S. Carey

Christopher N. Roman

Detailed bathymetric maps of the sea floor with centimeter level resolution can be produced by underwater vehicles using multibeam sonars and structured light laser imaging. Over spatial scales up to tens of thousands of square meters it is possible to produce maps gridded to sub centimeter levels. This level of accuracy demands detailed treatments of the sensor relative data, the vehicle navigation data and the vehicle to sensor position and rotational offsets. The presented results will show comparisons between these two sensor modalities. Data have a been collected during recent field programs to the Kolumbo volcanic crater and the Southern …


Remote Analysis Of Grain Size Characteristic In Submarine Pyroclastic Deposits From Kolumbo Volcano, Greece, C. Smart, D. P. Whitesell, C. Roman, S. Carey Dec 2011

Remote Analysis Of Grain Size Characteristic In Submarine Pyroclastic Deposits From Kolumbo Volcano, Greece, C. Smart, D. P. Whitesell, C. Roman, S. Carey

Christopher N. Roman

Grain size characteristics of pyroclastic deposits provide valuable information about source eruption energetics and depositional processes. Maximum size and sorting are often used to discriminate between fallout and sediment gravity flow processes during explosive eruptions. In the submarine environment the collection of such data in thick pyroclastic sequences is extremely challenging and potentially time consuming. A method has been developed to extract grain size information from stereo images collected by a remotely operated vehicle (ROV). In the summer of 2010 the ROV Hercules collected a suite of stereo images from a thick pumice sequence in the caldera walls of Kolumbo …


Detection Of Diffuse Sea Floor Venting Using Structured Light Imaging, G. Inglis, C. Smart, C. Roman, S. Carey Dec 2011

Detection Of Diffuse Sea Floor Venting Using Structured Light Imaging, G. Inglis, C. Smart, C. Roman, S. Carey

Christopher N. Roman

Efficiently identifying and localizing diffuse sea floor venting at hydrothermal and cold seep sites is often difficult. Actively venting fluids are usually identified by a temperature induced optical shimmering seen during direct visual inspections or in video data collected by vehicles working close to the sea floor. Relying on such direct methods complicates establishing spatial relations between areas within a survey covering a broad area. Our recent work with a structured light laser system has shown that venting can also be detected in the image data in an automated fashion. A structured light laser system consists of a camera and …


The Hydra Filesystem: A Distrbuted Storage Famework, Benjamin Gonzalez, George K. Thiruvathukal Nov 2011

The Hydra Filesystem: A Distrbuted Storage Famework, Benjamin Gonzalez, George K. Thiruvathukal

George K. Thiruvathukal

Hydra File System (HFS) is an experimental framework for constructing parallel and distributed filesystems. While parallel and distributed applications requiring scalable and flexible access to storage and retrieval are becoming more commonplace, parallel and distributed filesystems remain difficult to deploy easily and configure for different needs. HFS aims to be different by being true to the tradition of high-performance computing while employing modern design patterns to allow various policies to be configured on a per instance basis (e.g. storage, communication, security, and indexing schemes). We describe a working prototype (available for public download) that has been implemented in the Python …


Scalable Implementations Of Mpi Atomicity For Concurrent Overlapping I/O, Wei-Keng Liao, Alok Choudhary, Kenin Coloma, George K. Thiruvathukal, Lee Ward, Eric Russell, Neil Pundit Nov 2011

Scalable Implementations Of Mpi Atomicity For Concurrent Overlapping I/O, Wei-Keng Liao, Alok Choudhary, Kenin Coloma, George K. Thiruvathukal, Lee Ward, Eric Russell, Neil Pundit

George K. Thiruvathukal

For concurrent I/O operations, atomicity defines the results in the overlapping file regions simultaneously read/written by requesting processes. Atomicity has been well studied at the file system level, such as POSIX standard. In this paper, we investigate the problems arising from the implementation of MPI atomicity for concurrent overlapping write access and provide a few programming solutions. Since the MPI definition of atomicity differs from the POSIX one, an implementation that simply relies on the POSIX file systems does not guarantee correct MPI semantics. To have a correct implementation of atomic I/O in MPI, we examine the efficiency of three …


Naked Object File System (Nofs): A Framework To Expose An Object-Oriented Domain Model As A File System, Joseph P. Kaylor, Konstantin Läufer, George K. Thiruvathukal Nov 2011

Naked Object File System (Nofs): A Framework To Expose An Object-Oriented Domain Model As A File System, Joseph P. Kaylor, Konstantin Läufer, George K. Thiruvathukal

George K. Thiruvathukal

We present Naked Objects File System (NOFS), a novel framework that allows a developer to expose a domain model as a file system by leveraging the Naked Objects design principle. NOFS allows a developer to construct a file system without having to understand or implement all details related to normal file systems development. In this paper we explore file systems frameworks and object-oriented frameworks in a historical context and present an example domain model using the framework. This paper is based on a fully-functional implementation that is distributed as free/open source software, including virtual machine images to demonstrate and study …


Anticipating Technological Change: Predictions, Trends And Gadgets, Carol A. Watson Nov 2011

Anticipating Technological Change: Predictions, Trends And Gadgets, Carol A. Watson

Carol A. Watson

With the current economic downtown, today's business environment is more competitive than ever. Businesses that distinguish themselves in any small way and provide cost-savings, can gain a significant advantage over their rivals. To emphasize the point, note that the ABA Techshow 2009 has a session titled: If You’re Not Serving Your Clients Online, Someone Else Will Be. It is, therefore, essential that attorneys harness technology and remain up-to-date on the latest computer developments . In this paper, I will begin by discussing technologies that are currently available on the web that will increase your abilities to collaborate, reduce your office …


Technology Management Trends In Law Schools, Carol A. Watson, Larry Reeves Nov 2011

Technology Management Trends In Law Schools, Carol A. Watson, Larry Reeves

Carol A. Watson

Discusses the role of librarians in law school technology management and analyzes technology staffing survey results for 2002, 2006, and 2010. While survey results indicate a trend toward establishing separate information technology departments within law schools, librarians are and will continue to be actively involved in law school technology.


Forecast For The Future: Emerging Legal Technologies, Carol A. Watson Nov 2011

Forecast For The Future: Emerging Legal Technologies, Carol A. Watson

Carol A. Watson

Begins by discussing technologies that are currently available on the web that can reduce office overhead. Also highlights current general technology trends and still-developing technologies. Concludes with a list of frivolous gadgets to provide food for thought about the coming prospects of technology.


Location Constraints In Digital Rights Management, Adam Muhlbauer, Reihaneh Safavi-Naini, Farzad Salim, Nicholas Paul Sheppard, Martin Jan Surminen Nov 2011

Location Constraints In Digital Rights Management, Adam Muhlbauer, Reihaneh Safavi-Naini, Farzad Salim, Nicholas Paul Sheppard, Martin Jan Surminen

Reihaneh Safavi-Naini

Digital rights management allows information owners to control the use and dissemination of electronic documents via a machine-readable licence. This paper describes the design and implementation of a system for creating and enforcing licences containing location constraints that can be used to restrict access to sensitive documents to a defined area. Documents can be loaded onto a portable device and used in the approved areas, but cannot be used if the device moves to another area. Our contribution includes a taxonomy for access control in the presence of requests to perform non-instantaneous controlled actions.


Ipv6 Overview.Pdf, Douglas Huber Oct 2011

Ipv6 Overview.Pdf, Douglas Huber

Douglas Huber

Overview of the IPv6 Protocol


Issues In Human Capital Development : Lessons For Public Administration And Governance, Deogratias Harorimana Mr Oct 2011

Issues In Human Capital Development : Lessons For Public Administration And Governance, Deogratias Harorimana Mr

Dr Deogratias Harorimana

With few minerals or other natural resources, Rwanda believes that she can still achieve her ambitions by investing in human capital - her unique resource. If this ambition can be achieved, then is this the next role model for international development? We used a case study design and analysis methods to examine development models used elsewhere in recent decades, using both qualitative and quantitative data on Rwanda to establish the comparative advantages in relation to Singapore’s economic development model. The implications for international development are that (1) an effective human capital development strategy should be inclusive enough to respond to …


Semantic Geotagging: A Location-Based Hypermedia Approach To Creating Situational Awareness, Ray Bareiss, Martin Griss, Steven Rosenberg, Yu Zhang Sep 2011

Semantic Geotagging: A Location-Based Hypermedia Approach To Creating Situational Awareness, Ray Bareiss, Martin Griss, Steven Rosenberg, Yu Zhang

Ray Bareiss

As emergency first responders and commanders increasingly use mobile phones, tablets, and social media to communicate, coordinate, and manage information during disasters, we see a need and opportunity to provide a mobile device-appropriate semantic layer to a geographically-based common operating picture. The challenge is to provide a simple, usable structure for a rapidly growing body of information to simplify the development of situational awareness in an unfolding disaster. We use a hyperlinked structure based on the ASK model to organize information in a readily accessible form. In this paper we describe our initial design and experience with an Android-based prototype, …


Semantic Geotagging: A Location-Based Hypermedia Approach To Creating Situational Awareness, Ray Bareiss, Martin Griss, Steven Rosenberg, Yu Zhang Sep 2011

Semantic Geotagging: A Location-Based Hypermedia Approach To Creating Situational Awareness, Ray Bareiss, Martin Griss, Steven Rosenberg, Yu Zhang

Martin L Griss

As emergency first responders and commanders increasingly use mobile phones, tablets, and social media to communicate, coordinate, and manage information during disasters, we see a need and opportunity to provide a mobile device-appropriate semantic layer to a geographically-based common operating picture. The challenge is to provide a simple, usable structure for a rapidly growing body of information to simplify the development of situational awareness in an unfolding disaster. We use a hyperlinked structure based on the ASK model to organize information in a readily accessible form. In this paper we describe our initial design and experience with an Android-based prototype, …


Pandaa: Physical Arrangement Detection Of Networked Devices Through Ambient-Sound Awareness, Zheng Sun, Aveek Purohit, Kaifei Chen, Shijia Pan, Trevor Pering, Pei Zhang Sep 2011

Pandaa: Physical Arrangement Detection Of Networked Devices Through Ambient-Sound Awareness, Zheng Sun, Aveek Purohit, Kaifei Chen, Shijia Pan, Trevor Pering, Pei Zhang

Zheng Sun

Future ubiquitous home environments can contain 10s or 100s of devices. Ubiquitous services running on these devices (i.e. localizing users, routing, security algorithms) will commonly require an accurate location of each device. In order to obtain these locations, existing techniques require either a manual survey, active sound sources, or estimation using wireless radios. These techniques, however, need additional hardware capabilities and are intrusive to the user. Non-intrusive, automatic localization of ubiquitous computing devices in the home has the potential to greatly facilitate device deployments.

This paper presents the PANDAA system, a zero-configuration spatial localization system for networked devices based on …


Pandaa: Physical Arrangement Detection Of Networked Devices Through Ambient-Sound Awareness, Zheng Sun, Aveek Purohit, Kaifei Chen, Shijia Pan, Trevor Pering, Pei Zhang Sep 2011

Pandaa: Physical Arrangement Detection Of Networked Devices Through Ambient-Sound Awareness, Zheng Sun, Aveek Purohit, Kaifei Chen, Shijia Pan, Trevor Pering, Pei Zhang

Aveek Purohit

Future ubiquitous home environments can contain 10s or 100s of devices. Ubiquitous services running on these devices (i.e. localizing users, routing, security algorithms) will commonly require an accurate location of each device. In order to obtain these locations, existing techniques require either a manual survey, active sound sources, or estimation using wireless radios. These techniques, however, need additional hardware capabilities and are intrusive to the user. Non-intrusive, automatic localization of ubiquitous computing devices in the home has the potential to greatly facilitate device deployments.

This paper presents the PANDAA system, a zero-configuration spatial localization system for networked devices based on …


Pandaa: A Physical Arrangement Detection Technique For Networked Devices Through Ambient-Sound Awareness, Zheng Sun, Aveek Purohit, Philippe De Wagter, Irina Brinster, Chorom Hamm, Pei Zhang Aug 2011

Pandaa: A Physical Arrangement Detection Technique For Networked Devices Through Ambient-Sound Awareness, Zheng Sun, Aveek Purohit, Philippe De Wagter, Irina Brinster, Chorom Hamm, Pei Zhang

Zheng Sun

This demo presents PANDAA, a zero-configuration automatic spatial localization technique for networked devices based on ambient sound sensing. We will demonstrate that after initial placement of the devices, ambient sounds, such as human speech, music, footsteps, finger snaps, hand claps, or coughs and sneezes, can be used to autonomously resolve the spatial relative arrangement of devices, such as mobile phones, using trigonometric bounds and successive approximation.


Digital Filter Design For Jamming Mitigation In 802.15.4 Communication, Bruce Debruhl, Patrick Tague Jul 2011

Digital Filter Design For Jamming Mitigation In 802.15.4 Communication, Bruce Debruhl, Patrick Tague

Patrick Tague

Jamming attackers can dramatically increase attack efficiency and stealth by randomly or periodically cycling the jamming transmission on and off, attacks respectively known as random and periodic jamming. In this paper, we analyze the impact of such attacks on the IEEE 802.15.4 communication protocol, commonly used in wireless sensor networking applications, and show that the cycling behavior introduces a narrow spectral component into the received signal. We propose the inclusion of a digital filter at the receiver side to effectively eliminate this spectral component, and we discuss the benefits involved in this filter design. We evaluate the impacts of random …


Ict And The Education Sector In Tanzania: Effectiveness Of Introducing And Applying Ict In Higher Learning Institutions In Tanzania: The Case Of Ardhi University, Kristofa S. Nkembo, Daniel Koloseni, Faith J. Shimba Jul 2011

Ict And The Education Sector In Tanzania: Effectiveness Of Introducing And Applying Ict In Higher Learning Institutions In Tanzania: The Case Of Ardhi University, Kristofa S. Nkembo, Daniel Koloseni, Faith J. Shimba

Faith Joel Shimba

Academic Institutions are heavily investing in ICT in order to improve delivery and quality of education. But the process of introducing and applying ICT in Higher learning institutions is not effective to enable higher learning Institutions to reap fully the benefits offered by ICT. This book describes a number of factors that hindered the introduction and application of ICT at Ardhi University, which are limited ICT infrastructure, inadequate ICT personnel, inadequate training provided to staff, limited support services, inadequate financial resources,and insufficient budget for ICT infrastructure. Further it recommends among other things, improvement of ICT infrastructure, increasing the number of …


Design, Modeling And Control Strategy Of Pv/Fc Hybrid Power System, Dr. Adel A. Elbaset Jul 2011

Design, Modeling And Control Strategy Of Pv/Fc Hybrid Power System, Dr. Adel A. Elbaset

Dr. Adel A. Elbaset

This paper describes development of a general methodology of an autonomous PV/FC system composed of photovoltaic (PV), electrolyzer, hydrogen storage tank and fuel cell (FC). The aim of this paper is to determine optimum design, control strategy, economic and performance of a PV/FC hybrid power generation system without battery storage taking into account all losses in the system. The paper also presents a computer program based on Matlab software to determine optimum design, control strategy, economic and performance of an autonomous PV/FC hybrid power generation system. The computer program develops to size system components in order to match the load …


Wind Powered Datacenter: Indiana, Heather M. Brotherton Jun 2011

Wind Powered Datacenter: Indiana, Heather M. Brotherton

Heather M Brotherton

This paper will investigate the feasibility of co-locating data centers on Indiana wind farms. Strategic long-term planning including combining clean energy, information technology, and efficient data center design could allow Indiana to emerge as an information technology service leader. There are economic advantages to locating a data center in Indiana. The cost of living in Indiana is low in comparison places such as California with high concentrations of data centers. This in turn means a lower cost workforce. Many less costly areas of the United States lack skilled workers to staff data centers. This is not the case in Indiana. …


Is Data To Knowledge As The Wasp Is To The Fig Tree? Reconsidering Licklider’S Intergalactic Network In The Days Of Data Deluge., Christine L. Borgman Jun 2011

Is Data To Knowledge As The Wasp Is To The Fig Tree? Reconsidering Licklider’S Intergalactic Network In The Days Of Data Deluge., Christine L. Borgman

Christine L. Borgman

No abstract provided.


Coughloc: Location-Aware Indoor Acoustic Sensing For Non-Intrusive Cough Detection, Zheng Sun, Aveek Purohit, Kathleen Yang, Neha Pattan, Dan Siewiorek, Asim Smailagic, Ian Lane, Pei Zhang Jun 2011

Coughloc: Location-Aware Indoor Acoustic Sensing For Non-Intrusive Cough Detection, Zheng Sun, Aveek Purohit, Kathleen Yang, Neha Pattan, Dan Siewiorek, Asim Smailagic, Ian Lane, Pei Zhang

Zheng Sun

Pervasive medical monitoring has become an ideal alter- native to nursing care for elderly people and patients in hospitals. Existing systems using single body-worn sensors are often intrusive and less reliable. By contrast, ubiqui- tous acoustic sensing techniques can support non-intrusive and robust medical monitoring. In this paper, we describe CoughLoc, a ubiquitous acoustic sensing system for con- tinuous cough detection using a wireless sensor network. We show how knowledge of sound source locations can be leveraged to improve the detection accuracy of sound events caused by mobile users. Experiments in indoor environ- ments show our system achieves over 90% …


Towards Secure Multi-Path Routing For Wireless Mobile Ad-Hoc Networks: A Cross-Layer Strategy (Poster), Arjun Athreya, Patrick Tague May 2011

Towards Secure Multi-Path Routing For Wireless Mobile Ad-Hoc Networks: A Cross-Layer Strategy (Poster), Arjun Athreya, Patrick Tague

Patrick Tague

Multi-path routing establishes multiple paths between a source and destination node in a network. This helps in achieving reliability in mobile ad-hoc networks (MANETs). To achieve efficient, secure and reliable multi-path routing for MANETs, we propose a routing mechanism that uses crosslayer strategies. The cross-layer strategy involves incorporating feedback and information from layers below the network layer to make decisions at the network layer. We also propose a path evaluation mechanism for the paths returned by the proposed multi-path routing mechanism.


Using Textual Features To Predict Popular Content On Digg, Paul H. Miller May 2011

Using Textual Features To Predict Popular Content On Digg, Paul H. Miller

Paul H Miller

Over the past few years, collaborative rating sites, such as Netflix, Digg and Stumble, have become increasingly prevalent sites for users to find trending content. I used various data mining techniques to study Digg, a social news site, to examine the influence of content on popularity. What influence does content have on popularity, and what influence does content have on users’ decisions? Overwhelmingly, prior studies have consistently shown that predicting popularity based on content is difficult and maybe even inherently impossible. The same submission can have multiple outcomes and content neither determines popularity, nor individual user decisions. My results show …


Data Center Recovery Best Practices: Before, During, And After Disaster Recovery Execution, Heather M. Brotherton Apr 2011

Data Center Recovery Best Practices: Before, During, And After Disaster Recovery Execution, Heather M. Brotherton

Heather M Brotherton

This qualitative multiple case study analysis reviews well documented past information technology disasters with a goal of identifying practical before, during, and after disaster recovery best practices. The topic of cyberinfrastructure resiliency is explored including barriers to cyberinfrastructure resiliency. Factors explored include: adherence to established procedures, staff training in recovery procedures, chain of command structure, recovery time and cost, and mutual aid relationships. Helpful tools and resources are included to assist planners.


(Master's Thesis) Data Center Recovery Best Practices: Before, During, And After Disaster Recovery Execution, Heather M. Brotherton Apr 2011

(Master's Thesis) Data Center Recovery Best Practices: Before, During, And After Disaster Recovery Execution, Heather M. Brotherton

Heather M Brotherton

This qualitative multiple case study analysis reviews well documented past information technology disasters with a goal of identifying practical before, during, and after disaster recovery best practices. The topic of cyberinfrastructure resiliency is explored including barriers to cyberinfrastructure resiliency. Factors explored include: adherence to established procedures, staff training in recovery procedures, chain of command structure, recovery time and cost, and mutual aid relationships. Helpful tools and resources are included to assist planners.


An Exploration Of Knowledge And Skills Transfer From A Formal Software Engineering Curriculum To A Capstone Practicum Project, Ray Bareiss, Ed Katz Apr 2011

An Exploration Of Knowledge And Skills Transfer From A Formal Software Engineering Curriculum To A Capstone Practicum Project, Ray Bareiss, Ed Katz

Ray Bareiss

Students at Carnegie Mellon Silicon Valley complete a team-based practicum project for an industrial sponsor as the capstone of their master’s education in software engineering. Over time, the faculty member who typically serves as advisor for such projects has been disturbed by the failure of several student teams to transfer some relevant knowledge and skills from the formal curriculum to the relatively unstructured practicum project environment. We conducted a survey of all 2010 software engineering students to ascertain the most significant selfreported shortcomings. This paper presents the survey data and then discusses the results in terms of a theory of …


The Macos X Command Line, James P. Howard, Ii Apr 2011

The Macos X Command Line, James P. Howard, Ii

James Howard

My wife thinks I bought my Mac laptop to use as a status symbol. But every hacker knows I bought it because I wanted a decent Unix laptop.