Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer science

Discipline
Institution
Publication Year
Publication
Publication Type

Articles 61 - 90 of 94

Full-Text Articles in Computer Engineering

Mobile Devices: The Case For Cyber Security Hardened Systems, Maurice Dawson, Jorja Wright, Marwan Omar Dec 2014

Mobile Devices: The Case For Cyber Security Hardened Systems, Maurice Dawson, Jorja Wright, Marwan Omar

Maurice Dawson

Mobile devices are becoming a method to provide an efficient and convenient way to access, find and share information; however, the availability of this information has caused an increase in cyber attacks. Currently, cyber threats range from Trojans and viruses to botnets and toolkits. Presently, 96% of mobile devices do not have pre-installed security software while approximately 65% of the vulnerabilities are found within the application layer. This lack in security and policy driven systems is an opportunity for malicious cyber attackers to hack into the various popular devices. Traditional security software found in desktop computing platforms, such as firewalls, …


A Brief Review Of New Threats And Countermeasures In Digital Crime And Cyber Terrorism, Maurice Dawson Dec 2014

A Brief Review Of New Threats And Countermeasures In Digital Crime And Cyber Terrorism, Maurice Dawson

Maurice Dawson

Cyber security is becoming the cornerstone of national security policies in many countries around the world as it is an interest to many stakeholders, including utilities, regulators, energy markets, government entities, and even those that wish to exploit the cyber infrastructure. Cyber warfare is quickly becoming the method of warfare and the tool of military strategists. Additionally, it is has become a tool for governments to aid or exploit for their own personal benefits. For cyber terrorists there has been an overwhelmingly abundance of new tools and technologies available that have allowed criminal acts to occur virtually anywhere in the …


The Department Of Engineering And Computer Science Class Of 2014 Computer Science And Computer And Electrical Engineering Academic Celebration Program, Cedarville University May 2014

The Department Of Engineering And Computer Science Class Of 2014 Computer Science And Computer And Electrical Engineering Academic Celebration Program, Cedarville University

Engineering and Computer Science Academic Celebrations

No abstract provided.


A Brief Overview Of The Nebula Future Internet Architecture, Tom Anderson, Ken Birman, Robert Broberg, Matthew Caesar, Douglas Comer, Chase Cotton, Michael J. Freedman, Andreas Haeberlen, Zachary G. Ives, Arvind Krishnamurthy, William Lehr, Boon Thau Loo, David Mazieres, Antonio Nicolosi, Jonathan M. Smith, Ion Stoica, Robbert Van Renesse, Michael Walfish, Hakim Weatherspoon, Christopher S. Yoo Jan 2014

A Brief Overview Of The Nebula Future Internet Architecture, Tom Anderson, Ken Birman, Robert Broberg, Matthew Caesar, Douglas Comer, Chase Cotton, Michael J. Freedman, Andreas Haeberlen, Zachary G. Ives, Arvind Krishnamurthy, William Lehr, Boon Thau Loo, David Mazieres, Antonio Nicolosi, Jonathan M. Smith, Ion Stoica, Robbert Van Renesse, Michael Walfish, Hakim Weatherspoon, Christopher S. Yoo

All Faculty Scholarship

NEBULA is a proposal for a Future Internet Architecture. It is based on the assumptions that: (1) cloud computing will comprise an increasing fraction of the application workload offered to an Internet, and (2) that access to cloud computing resources will demand new architectural features from a network. Features that we have identified include dependability, security, flexibility and extensibility, the entirety of which constitute resilience.

NEBULA provides resilient networking services using ultrareliable routers, an extensible control plane and use of multiple paths upon which arbitrary policies may be enforced. We report on a prototype system, Zodiac, that incorporates these latter …


The Future Of National And International Security On The Internet, Maurice Dawson, Marwan Omar, Jonathan Abramson, Dustin Bessette Dec 2013

The Future Of National And International Security On The Internet, Maurice Dawson, Marwan Omar, Jonathan Abramson, Dustin Bessette

Maurice Dawson

Hyperconnectivity is a growing trend that is driving cyber security experts to develop new security architectures for multiple platforms such as mobile devices, laptops, and even wearable displays. The futures of national and international security rely on complex countermeasures to ensure that a proper security posture is maintained during this state of hyperconnectivity. To protect these systems from exploitation of vulnerabilities it is essential to understand current and future threats to include the laws that drive their need to be secured. Examined within this chapter are the potential security-related threats with the use of social media, mobile devices, virtual worlds, …


The Department Of Engineering And Computer Science Class Of 2013 Celebration Program, Cedarville University May 2013

The Department Of Engineering And Computer Science Class Of 2013 Celebration Program, Cedarville University

Engineering and Computer Science Academic Celebrations

No abstract provided.


The Evolution Of Successful Service-Learning Courses In The Computing Curriculum: From Infancy To Innovation, Jean F. Coppola Phd, Susan Feather-Gannon, Catharina Daniels, Nancy Lynch Hale, Pauline Mosley Jan 2013

The Evolution Of Successful Service-Learning Courses In The Computing Curriculum: From Infancy To Innovation, Jean F. Coppola Phd, Susan Feather-Gannon, Catharina Daniels, Nancy Lynch Hale, Pauline Mosley

Wilson Center for Social Entrepreneurship

The purpose of this paper is to relate the evolution of successful service-learning courses in a school of computer science and information systems spanning over a 20-year period. The authors share their experiences in developing technology-based service-learning courses for both majors and non-majors. Most recently, these courses have enabled undergraduate first-year students to be exposed to exciting technologies, such as robotics and mobile app development. The challenges, benefits, and lessons learned are discussed.


The Nebula Future Internet Architecture, Christopher S. Yoo, Ken Birman, Robert Broberg, Matthew Caesar, Douglas Comer, Chase Cotton, Michael J. Freed, Andreas Haeberlen, Zachary G. Ives, Arvind Krishnamurthy, William Lehr, Boon Thau Loo, David Mazieres, Antonio Nicolosi, Jonathan M. Smith, Ion Stoica, Robbert Van Renesse, Michael Walfish, Hakim Weatherspoon Jan 2013

The Nebula Future Internet Architecture, Christopher S. Yoo, Ken Birman, Robert Broberg, Matthew Caesar, Douglas Comer, Chase Cotton, Michael J. Freed, Andreas Haeberlen, Zachary G. Ives, Arvind Krishnamurthy, William Lehr, Boon Thau Loo, David Mazieres, Antonio Nicolosi, Jonathan M. Smith, Ion Stoica, Robbert Van Renesse, Michael Walfish, Hakim Weatherspoon

All Faculty Scholarship

NEBULA is a proposal for a Future Internet Architecture. It is based on the assumptions that: (1) cloud computing will comprise an increasing fraction of the application workload offered to an Internet, and (2) that access to cloud computing resources will demand new architectural features from a network. Features that we have identified include dependability, security, flexibility and extensibility, the entirety of which constitute resilience. NEBULA provides resilient networking services using ultrareliable routers, an extensible control plane and use of multiple paths upon which arbitrary policies may be enforced. We report on a prototype system, Zodiac, that incorporates these latter …


Transforming Information Systems And Computer Science Education With Virtualization, Maurice E. Dawson Jr., Jorja Wright, Jonathan Abramson Dec 2012

Transforming Information Systems And Computer Science Education With Virtualization, Maurice E. Dawson Jr., Jorja Wright, Jonathan Abramson

Maurice Dawson

This paper will propose an innovative method to transform information systems (IS) and computer science education on a global scale. This method will introduce the use of virtualization and cloud computing combined with open source software (OSS) in higher education. This will allow for those studying IS and computer science to work independently on projects anywhere in the world from a baseline image that has been developed with information assurance (IA) controls. Additionally, this will allow professors and course developers to deploy their own customized virtual machines (VMs) to be used with the course. These VMs will host their own …


Front Burner Jul 2012

Front Burner

Syracuse University Magazine

No abstract provided.


The Department Of Engineering And Computer Science Class Of 2012 Convocation Program, Cedarville University May 2012

The Department Of Engineering And Computer Science Class Of 2012 Convocation Program, Cedarville University

Engineering and Computer Science Academic Celebrations

No abstract provided.


Naked Object File System (Nofs): A Framework To Expose An Object-Oriented Domain Model As A File System, Joseph P. Kaylor, Konstantin Läufer, George K. Thiruvathukal Jan 2012

Naked Object File System (Nofs): A Framework To Expose An Object-Oriented Domain Model As A File System, Joseph P. Kaylor, Konstantin Läufer, George K. Thiruvathukal

Konstantin Läufer

We present Naked Objects File System (NOFS), a novel framework that allows a developer to expose a domain model as a file system by leveraging the Naked Objects design principle. NOFS allows a developer to construct a file system without having to understand or implement all details related to normal file systems development. In this paper we explore file systems frameworks and object-oriented frameworks in a historical context and present an example domain model using the framework. This paper is based on a fully-functional implementation that is distributed as free/open source software, including virtual machine images to demonstrate and study …


The Hydra Filesystem: A Distrbuted Storage Famework, Benjamin Gonzalez, George K. Thiruvathukal Nov 2011

The Hydra Filesystem: A Distrbuted Storage Famework, Benjamin Gonzalez, George K. Thiruvathukal

George K. Thiruvathukal

Hydra File System (HFS) is an experimental framework for constructing parallel and distributed filesystems. While parallel and distributed applications requiring scalable and flexible access to storage and retrieval are becoming more commonplace, parallel and distributed filesystems remain difficult to deploy easily and configure for different needs. HFS aims to be different by being true to the tradition of high-performance computing while employing modern design patterns to allow various policies to be configured on a per instance basis (e.g. storage, communication, security, and indexing schemes). We describe a working prototype (available for public download) that has been implemented in the Python …


Scalable Implementations Of Mpi Atomicity For Concurrent Overlapping I/O, Wei-Keng Liao, Alok Choudhary, Kenin Coloma, George K. Thiruvathukal, Lee Ward, Eric Russell, Neil Pundit Nov 2011

Scalable Implementations Of Mpi Atomicity For Concurrent Overlapping I/O, Wei-Keng Liao, Alok Choudhary, Kenin Coloma, George K. Thiruvathukal, Lee Ward, Eric Russell, Neil Pundit

George K. Thiruvathukal

For concurrent I/O operations, atomicity defines the results in the overlapping file regions simultaneously read/written by requesting processes. Atomicity has been well studied at the file system level, such as POSIX standard. In this paper, we investigate the problems arising from the implementation of MPI atomicity for concurrent overlapping write access and provide a few programming solutions. Since the MPI definition of atomicity differs from the POSIX one, an implementation that simply relies on the POSIX file systems does not guarantee correct MPI semantics. To have a correct implementation of atomic I/O in MPI, we examine the efficiency of three …


Naked Object File System (Nofs): A Framework To Expose An Object-Oriented Domain Model As A File System, Joseph P. Kaylor, Konstantin Läufer, George K. Thiruvathukal Nov 2011

Naked Object File System (Nofs): A Framework To Expose An Object-Oriented Domain Model As A File System, Joseph P. Kaylor, Konstantin Läufer, George K. Thiruvathukal

George K. Thiruvathukal

We present Naked Objects File System (NOFS), a novel framework that allows a developer to expose a domain model as a file system by leveraging the Naked Objects design principle. NOFS allows a developer to construct a file system without having to understand or implement all details related to normal file systems development. In this paper we explore file systems frameworks and object-oriented frameworks in a historical context and present an example domain model using the framework. This paper is based on a fully-functional implementation that is distributed as free/open source software, including virtual machine images to demonstrate and study …


The Department Of Engineering And Computer Science Class Of 2011 Convocation Program, Cedarville University May 2011

The Department Of Engineering And Computer Science Class Of 2011 Convocation Program, Cedarville University

Engineering and Computer Science Academic Celebrations

No abstract provided.


Sorting On Cuda, Ayushi Sinha Apr 2011

Sorting On Cuda, Ayushi Sinha

Mathematics & Computer Science Student Scholarship

The traditional sorting technique, sequential sorting, is inefficient with increasing amounts of data that can be stored on computers. Researchers looking for faster sorting techniques have turned to parallel computing to address the limitations of sequential sorting. This project involves the implementation of three parallel sorting algorithms on CUDA, a parallel computing architecture which implements algorithms on Graphics Processing Units (GPUs).


5 Ghz Band Vehicle-To-Vehicle Channels: Models For Multiple Values Of Channel Bandwidth, Qiong Wu, David W. Matolak, Indranil Sen Jun 2010

5 Ghz Band Vehicle-To-Vehicle Channels: Models For Multiple Values Of Channel Bandwidth, Qiong Wu, David W. Matolak, Indranil Sen

Faculty Publications

In Sen and Matolak's earlier paper, 5-GHz-band vehicle-to-vehicle (V2V) channel models were presented for channel bandwidths of 5 and 10 MHz. In this paper, we provide additional tapped delay line models for bandwidths of 1, 20, 33.33, and 50 MHz based upon the data used in Sen and Matolak's paper. We provide tables of channel parameters for five types of V2V channel classes and also include example tap correlation coefficients. Root-mean-square delay spread values are summarized, as are values of bandwidth for which the channel frequency correlation takes values of 0.7 and 0.5. As with the results from Sen and …


Naked Object File System (Nofs): A Framework To Expose An Object-Oriented Domain Model As A File System, Joseph P. Kaylor, Konstantin Läufer, George K. Thiruvathukal May 2010

Naked Object File System (Nofs): A Framework To Expose An Object-Oriented Domain Model As A File System, Joseph P. Kaylor, Konstantin Läufer, George K. Thiruvathukal

Computer Science: Faculty Publications and Other Works

We present Naked Objects File System (NOFS), a novel framework that allows a developer to expose a domain model as a file system by leveraging the Naked Objects design principle. NOFS allows a developer to construct a file system without having to understand or implement all details related to normal file systems development. In this paper we explore file systems frameworks and object-oriented frameworks in a historical context and present an example domain model using the framework. This paper is based on a fully-functional implementation that is distributed as free/open source software, including virtual machine images to demonstrate and study …


The Department Of Engineering And Computer Science Class Of 2010 Convocation Program, Cedarville University Apr 2010

The Department Of Engineering And Computer Science Class Of 2010 Convocation Program, Cedarville University

Engineering and Computer Science Academic Celebrations

No abstract provided.


Web-Dinar: Web Based Diagnosis Of Network And Application Resources In Disaster Response Systems, Kartik Deshpande Jan 2010

Web-Dinar: Web Based Diagnosis Of Network And Application Resources In Disaster Response Systems, Kartik Deshpande

Masters Theses 1911 - February 2014

Disaster management and emergency response mechanisms are coming of age post 9/11. Paper based triaging and evacuation is slowly being replaced with much advanced mechanisms using remote clients (Laptops, Thin clients, PDAs), RFiDs etc. This reflects a modern trend to deploy Information Technology (IT) in disaster management. IT elements provide a great a deal of flexibility and seamlessness in the communication of information. The information flowing is so critical that, loss of data is not at all acceptable. Loss of data would mean loss of critical medical information portraying the disaster scenario. This would amount to a wrong picture being …


The Department Of Engineering And Computer Science Class Of 2009 Convocation Program, Cedarville University May 2009

The Department Of Engineering And Computer Science Class Of 2009 Convocation Program, Cedarville University

Engineering and Computer Science Academic Celebrations

No abstract provided.


The Department Of Engineering And Computer Science Class Of 2008 Convocation Program, Cedarville University May 2008

The Department Of Engineering And Computer Science Class Of 2008 Convocation Program, Cedarville University

Engineering and Computer Science Academic Celebrations

No abstract provided.


Back-Up Server For Computer Science Department, Victoria Gaylord Oct 2007

Back-Up Server For Computer Science Department, Victoria Gaylord

Mahurin Honors College Capstone Experience/Thesis Projects

Because Western Kentucky University does not maintain a back-up system for its departments, the Computer Science Department has implemented its own. Using Bacula software on a Unix server, files from faculty desktop computers and servers are backed up to a tape drive on a daily basis. The server is protected from outside threats with a carefully configured firewall script. This paper explains how both the firewall and the back-up software were implemented and how successful that implementation has been.


The Department Of Engineering And Computer Science Class Of 2007 Convocation Program, Cedarville University May 2007

The Department Of Engineering And Computer Science Class Of 2007 Convocation Program, Cedarville University

Engineering and Computer Science Academic Celebrations

No abstract provided.


Applying The Levels Of Conceptual Interoperability Model In Support Of Integratability, Interoperability, And Composability For System-Of-Systems Engineering, Andreas Tolk, Saikou Y. Diallo, Charles D. Turnitsa Jan 2007

Applying The Levels Of Conceptual Interoperability Model In Support Of Integratability, Interoperability, And Composability For System-Of-Systems Engineering, Andreas Tolk, Saikou Y. Diallo, Charles D. Turnitsa

Computational Modeling & Simulation Engineering Faculty Publications

The Levels of Conceptual Interoperability Model (LCIM) was developed to cope with the different layers of interoperation of modeling & simulation applications. It introduced technical, syntactic, semantic, pragmatic, dynamic, and conceptual layers of interoperation and showed how they are related to the ideas of integratability, interoperability, and composability. The model was successfully applied in various domains of systems, cybernetics, and informatics.


The Hydra Filesystem: A Distrbuted Storage Famework, Benjamin Gonzalez, George K. Thiruvathukal Jan 2006

The Hydra Filesystem: A Distrbuted Storage Famework, Benjamin Gonzalez, George K. Thiruvathukal

Computer Science: Faculty Publications and Other Works

Hydra File System (HFS) is an experimental framework for constructing parallel and distributed filesystems. While parallel and distributed applications requiring scalable and flexible access to storage and retrieval are becoming more commonplace, parallel and distributed filesystems remain difficult to deploy easily and configure for different needs. HFS aims to be different by being true to the tradition of high-performance computing while employing modern design patterns to allow various policies to be configured on a per instance basis (e.g. storage, communication, security, and indexing schemes). We describe a working prototype (available for public download) that has been implemented in the Python …


Scalable Implementations Of Mpi Atomicity For Concurrent Overlapping I/O, Wei-Keng Liao, Alok Choudhary, Kenin Coloma, George K. Thiruvathukal, Lee Ward, Eric Russell, Neil Pundit Jan 2003

Scalable Implementations Of Mpi Atomicity For Concurrent Overlapping I/O, Wei-Keng Liao, Alok Choudhary, Kenin Coloma, George K. Thiruvathukal, Lee Ward, Eric Russell, Neil Pundit

Computer Science: Faculty Publications and Other Works

For concurrent I/O operations, atomicity defines the results in the overlapping file regions simultaneously read/written by requesting processes. Atomicity has been well studied at the file system level, such as POSIX standard. In this paper, we investigate the problems arising from the implementation of MPI atomicity for concurrent overlapping write access and provide a few programming solutions. Since the MPI definition of atomicity differs from the POSIX one, an implementation that simply relies on the POSIX file systems does not guarantee correct MPI semantics. To have a correct implementation of atomic I/O in MPI, we examine the efficiency of three …


Automatic Human Face Detection In Color Images, Son Lam Phung Jan 2003

Automatic Human Face Detection In Color Images, Son Lam Phung

Theses: Doctorates and Masters

Automatic human face detection in digital image has been an active area of research over the past decade. Among its numerous applications, face detection plays a key role in face recognition system for biometric personal identification, face tracking for intelligent human computer interface (HCI), and face segmentation for object-based video coding. Despite significant progress in the field in recent years, detecting human faces in unconstrained and complex images remains a challenging problem in computer vision. An automatic system that possesses a similar capability as the human vision system in detecting faces is still a far-reaching goal. This thesis focuses on …


Web-Based Interactive Self-Evaluation System For Computer Science In Generic Tutorial System For The Sciences Project, Supachai Praritsantik Jan 2002

Web-Based Interactive Self-Evaluation System For Computer Science In Generic Tutorial System For The Sciences Project, Supachai Praritsantik

Theses Digitization Project

The goal of this master project is to promote and facilitate the use of new web-based and Java-based technologies in the development of self-evaluation systems for computer science; in particular, analysis of sorting algorithms.