Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Archival (2)
- Color space (2)
- Content delivery networks (2)
- DNG (2)
- Digital preservation (2)
-
- Multihoming (2)
- Network neutrality (2)
- Paid peering (2)
- Parametric editing (2)
- Partial transit (2)
- Private peering (2)
- Quality of service (2)
- Raster image editing (2)
- Raw (2)
- Secondary peering (2)
- Server farms (2)
- Still image formats (2)
- TIFF (2)
- Two-sided markets (2)
- Andragogy (1)
- Bandwidth (1)
- Behavioral modeling (1)
- Bibliographies (1)
- Broadband policy (1)
- Business modeling (1)
- Client-server (1)
- Cloud computing (1)
- Competency model (1)
- Complementary assets (1)
- Computer forensics (1)
- Publication
-
- All Faculty Scholarship (4)
- Conference Papers (2)
- Electrical & Computer Engineering and Computer Science Faculty Publications (2)
- Systems Science Faculty Publications and Presentations (2)
- Computational Modeling & Simulation Engineering Faculty Publications (1)
-
- Computer Sciences and Electrical Engineering Faculty Research (1)
- Cornerstone 3 Reports : Interdisciplinary Informatics (1)
- Faculty Publications (1)
- Presentations (1)
- Publications and Research (1)
- Published Works (1)
- Research Collection Lee Kong Chian School of Business (1)
- UConn Library Presentations (1)
- Visual Communications and Technology Education Faculty Publications (1)
- File Type
Articles 1 - 20 of 20
Full-Text Articles in Computer Engineering
Attitudes Of Health Professionals To Electronic Data Sharing Within An Integrated Care Electronic Health Record (Icehr), Charyl O'Malley, Damon Berry, Mary Sharp
Attitudes Of Health Professionals To Electronic Data Sharing Within An Integrated Care Electronic Health Record (Icehr), Charyl O'Malley, Damon Berry, Mary Sharp
Conference Papers
It is estimated that 98,000 people die in hospitals yearly in the USA as a result of medical errors (Agency for Healthcare Research and Quality, 2009). Electronic Health Records (EHR) can offer improved patient safety. EHRs are being implemented by many countries, however, not all health professionals have welcomed them (MORI Social Research Institute, 2006). As outlined in the National Health Information Strategy (NHIS) document, Ireland has plans to introduce an EHR. Attitudes of health professionals are a significant factor for the successful implementation and adoption of a new clinical information system. This study aimed to gauge the attitude of …
Product Life Cycle Theory And The Maturation Of The Internet, Christopher S. Yoo
Product Life Cycle Theory And The Maturation Of The Internet, Christopher S. Yoo
All Faculty Scholarship
Much of the recent debate over Internet policy has focused on the permissibility of business practices that are becoming increasingly common, such as new forms of network management, prioritization, pricing, and strategic partnerships. This Essay analyzes these developments through the lens of the management literature on the product life cycle, dominant designs, technological trajectories and design hierarchies, and the role of complementary assets in determining industry structure. This analysis suggests that many of these business practices may represent nothing more than a reflection of how the nature of competition changes as industries mature. This in turn suggests that network neutrality …
Assessing Value Creation And Value Capture In Digital Business Ecosystems, Ravi S. Sharma, Francis Pereira, Narayan Ramasubbu, Margaret Tan, F. Ted Tschang
Assessing Value Creation And Value Capture In Digital Business Ecosystems, Ravi S. Sharma, Francis Pereira, Narayan Ramasubbu, Margaret Tan, F. Ted Tschang
Research Collection Lee Kong Chian School of Business
Interest in business modeling of technology enterprises – the activity of designing the architecture for revenues, costs, products and/or services delivery and the overall value of an enterprise – has risen to prominence with the global crossing of the Internet chasm. However, as several studies have pointed out (c.f., Osterwalder, Pigneur & Tucci, 2005; Teece 2010; Zott & Amit, 2010), the investigations of business models and their fit with the strategy of an enterprise, have received little scholarly attention. In this article we formulate a framework, called ADVISOR, for modeling the business strategies of enterprises in the Interactive Digital Media …
Refining The Digital Device Hierarchy, F. Chevonne Dancer, David Dampier
Refining The Digital Device Hierarchy, F. Chevonne Dancer, David Dampier
Computer Sciences and Electrical Engineering Faculty Research
Smartphones are increasing in popularity due to functionality, portability, convenience and affordability. Because of this, examiners must acquire and analyze these devices when criminal activity is suspected to have occurred. In order to obtain this information, it has to be extracted in a way that is repeatable and testable. There are several process models available for use, but the ad-hoc approach is on the rise. The dilemmas are that ad-hoc approaches and the forensic investigative process models available are not well suited for the examination of such devices. These approaches may cause the validity of investigator skill and methods to …
Paper Chase: Resources To Organize Your Papers And Bibliographies, Sharon Bradley
Paper Chase: Resources To Organize Your Papers And Bibliographies, Sharon Bradley
Presentations
Shares data and information management software that is freely available on the Internet for personal and professional use. Includes overviews of Zotero, Evernote, and Mendeley, which enable users to format bibliographies as well as share and save important information as documents, photographs and audio files.
Personal Vs. Social, Magdalini Eirinaki
Personal Vs. Social, Magdalini Eirinaki
Faculty Publications
The last few years we witnessed an impressive growth in social networks and in applications that add value to their amassed information. At the same time, the continuing expansion of mobile platforms and applications (e.g. iPhone), combined with the overwhelming supply of information and services, makes effective personalization and context-awareness much required features. One may consider "personal" and "social" data management as comprising two distinct directions with conflicting characteristics. However, it can be argued that they complement each other and that in future applications they will ultimately converge. This "personal vs. social" predicament presents a number of interesting topics that …
Iphone 3gs Forensics: Logical Analysis Using Apple Itunes Backup Utility, Mona Bader, Ibrahim Baggili
Iphone 3gs Forensics: Logical Analysis Using Apple Itunes Backup Utility, Mona Bader, Ibrahim Baggili
Electrical & Computer Engineering and Computer Science Faculty Publications
The iPhone mobile is used worldwide due to its enhanced computing capabilities, increased storage capacity as well as its attractive touch interface. These characteristics made the iPhone a popular smart phone device. The increased use of the iPhone lead it to become a potential source of digital evidence in criminal investigations. Therefore, iPhone forensics turned into an essential practice for forensic and security practitioners today. This research aimed at investigating and examining the logical backup acquisition of the iPhone 3GS mobile device using the Apple iTunes backup utility. It was found that significant data of forensic value such as e-mail …
Informatics And Natural Computation: Final Report, Francis T. Marchese
Informatics And Natural Computation: Final Report, Francis T. Marchese
Cornerstone 3 Reports : Interdisciplinary Informatics
The purpose of this grant is to develop an interdisciplinary course in Informatics and Natural Computation that would service undergraduate computer, natural, and physical science majors. Informatics is the science of information, the practice of information processing, and the engineering of information systems. Informatics studies the structure, algorithms, behavior, and interactions of natural and artificial systems that store, process, access and communicate information. Natural computing refers to a collection of disciplines that unite nature with computing in three distinct ways:
1. Nature serves as a source of inspiration for the development of computational tools or systems that are used for …
Comparing Discrete Simulation And System Dynamics: Modeling An Anti-Insurgency Influence Operation, Wayne Wakeland, Una E. Medina
Comparing Discrete Simulation And System Dynamics: Modeling An Anti-Insurgency Influence Operation, Wayne Wakeland, Una E. Medina
Systems Science Faculty Publications and Presentations
This paper contrasts the tradeoffs of modeling the same dynamic problem at a micro scale and at a macro scale of analysis: discrete system simulation (DS) versus continuous system simulation or system dynamics (SD). Both are employed to model the influence of entertainment education on terrorist system decay, with implications for field application. Each method optimizes different design, scope/scale, data availability/accuracy, parameter settings, and system sensitivities. Whether the research served by the computer model is applied or theoretical, DS tends to be useful for understand low-level individual unit/step influences on system change over time, whereas SD tends to shine when …
System Dynamics Implementation Of An Extended Brander And Taylor-Like Easter Island Model, Takuro Uehara, Yoko Nagase, Wayne Wakeland
System Dynamics Implementation Of An Extended Brander And Taylor-Like Easter Island Model, Takuro Uehara, Yoko Nagase, Wayne Wakeland
Systems Science Faculty Publications and Presentations
We provide a system dynamics implementation of a dynamic ecological economics model. Dynamic economic models are often constrained to use functions, such as the Cobb-Douglas function, chosen “conveniently” to allow for analytic solutions. The C-D function, however, suffers from its fixed elasticity that does not allow for the substitutability between man-made capital and natural capital to change, which is vital for economic sustainability. Using system dynamics removes this constraint and enables more realistic ecological economics models containing functions not amenable to analytic solution. The base model is the natural resource and population growth model developed by Brander and Taylor (1998) …
Presentation On Raw As Archival Still Image Format: A Consideration, Michael J. Bennett, F. Barry Wheeler
Presentation On Raw As Archival Still Image Format: A Consideration, Michael J. Bennett, F. Barry Wheeler
UConn Library Presentations
No abstract provided.
Raw As Archival Still Image Format: A Consideration, Michael J. Bennett, F. Barry Wheeler
Raw As Archival Still Image Format: A Consideration, Michael J. Bennett, F. Barry Wheeler
Published Works
Source materials like fine art, over-sized, fragile maps, and delicate artifacts have traditionally been digitally converted through the use of controlled lighting and high resolution scanners and camera backs. In addition the capture of items such as general and special collections bound monographs has recently grown both through consortial efforts like the Internet Archive's Open Content Alliance and locally at the individual institution level. These projects, in turn, have introduced increasingly higher resolution consumer-grade digital single lens reflex cameras or "DSLRs" as a significant part of the general cultural heritage digital conversion workflow. Central to the authors' discussion is the …
Synthetic Corpora: A Synergy Of Linguistics And Computer Animation, Jerry C. Schnepp, Rosalee Wolfe, John Mcdonald
Synthetic Corpora: A Synergy Of Linguistics And Computer Animation, Jerry C. Schnepp, Rosalee Wolfe, John Mcdonald
Visual Communications and Technology Education Faculty Publications
Synthetic corpora enable the creation of computer-generated animations depicting sign language and are the complement of corpora containing videotaped exemplars. Any design for a synthetic corpus needs to accommodate linguistic processes as well as support the generation of believable, acceptable synthesized utterances. This paper explores one possibility for representing linguistic and extralinguistic processes that involve the face and reports on the outcomes of a user test evaluating the clarity of utterances synthesized by this approach.
Healthcare Professional Roles: The Ontology Model For E-Learning, Lorraine Carmody, Elizabeth Sherry, John Cardiff
Healthcare Professional Roles: The Ontology Model For E-Learning, Lorraine Carmody, Elizabeth Sherry, John Cardiff
Conference Papers
The paper aims to present the MEDeLEARN project, an ontology-driven virtual learning environment for Medical Information System training. The current training environment for healthcare professionals in the use of essential medical information systems in a large urban training hospital is based on conventional instructor-led training sessions. Problems arise due to the demanding nature of the hospital working environment, causing training to be cancelled or curtailed. This mode of training delivery is deemed to be inefficient and ineffective, with the danger of serious errors occurring as a consequence.
The project investigates whether a virtual learning environment can address the competency gap …
Network Neutrality Or Internet Innovation?, Christopher S. Yoo
Network Neutrality Or Internet Innovation?, Christopher S. Yoo
All Faculty Scholarship
Over the past two decades, the Internet has undergone an extensive re-ordering of its topology that has resulted in increased variation in the price and quality of its services. Innovations such as private peering, multihoming, secondary peering, server farms, and content delivery networks have caused the Internet’s traditionally hierarchical architecture to be replaced by one that is more heterogeneous. Relatedly, network providers have begun to employ an increasingly varied array of business arrangements and pricing. This variation has been interpreted by some as network providers attempting to promote their self interest at the expense of the public. In fact, these …
Application Planning, Jochen Albrecht, Clare Davies
Application Planning, Jochen Albrecht, Clare Davies
Publications and Research
No abstract provided.
Challenges For Human, Social, Cultural, And Behavioral Modeling, S. K. Numrich, Andreas Tolk
Challenges For Human, Social, Cultural, And Behavioral Modeling, S. K. Numrich, Andreas Tolk
Computational Modeling & Simulation Engineering Faculty Publications
Today's military focus has moved away from the force-on-force battlefield of the past century and into the domain of irregular warfare and its companion security, stability, transition and reconstruction missions. With that change in focus has come a need to examine the operational environment from a wider perspective, one that includes the whole range of human experiences and circumstances. As the set of factors and list of players expands, the need for reliable modeling and simulation increases, if for no other reason than to help the human decision maker make sense of this expanded decision space. However, to do this, …
Generating System Requirements For A Mobile Digital Evidence Collection System: A Preliminary Step Towards Enhancing The Forensic Collection Of Digital Devices, Ibrahim Baggili
Electrical & Computer Engineering and Computer Science Faculty Publications
Collecting digital devices in a forensically sound manner is becoming more critical since 80% of all cases have some sort of digital evidence involved in them (Rogers, 2006, p. 1) .The process of documenting and tagging digital devices is cumbersome and involves details that might not apply to other types of evidence, since each evidence item has unique physical characteristics (Hesitis & Wilbon, 2005, p. 17). The process becomes less manageable when a large number of digital devices are seized. This paper examines the information and issues investigators should be aware of when collecting digital devices at crime scenes. Furthermore, …
Innovations In The Internet’S Architecture That Challenge The Status Quo, Christopher S. Yoo
Innovations In The Internet’S Architecture That Challenge The Status Quo, Christopher S. Yoo
All Faculty Scholarship
The current debate over broadband policy has largely overlooked a number of changes to the architecture of the Internet that have caused the price paid by and quality of service received by traffic traveling across the Internet to vary widely. Topological innovations, such as private peering, multihoming, secondary peering, server farms, and content delivery networks, have caused the Internet’s traditionally hierarchical architecture to be replaced by one that is more heterogeneous. Moreover, network providers have begun to employ an increasingly varied array of business arrangements. Some of these innovations are responses to the growing importance of peer-to-peer technologies. Others, such …
The Changing Patterns Of Internet Usage, Christopher S. Yoo
The Changing Patterns Of Internet Usage, Christopher S. Yoo
All Faculty Scholarship
The Internet unquestionably represents one of the most important technological developments in recent history. It has revolutionized the way people communicate with one another and obtain information and created an unimaginable variety of commercial and leisure activities. Interestingly, many members of the engineering community often observe that the current network is ill-suited to handle the demands that end users are placing on it. Indeed, engineering researchers often describe the network as ossified and impervious to significant architectural change. As a result, both the U.S. and the European Commission are sponsoring “clean slate” projects to study how the Internet might be …