Open Access. Powered by Scholars. Published by Universities.®

Computer and Systems Architecture Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Computer and Systems Architecture

Web-Based Archaeology And Collaborative Research, Fabrizio Galeazzi, Heather Richards-Rissetto Nov 2018

Web-Based Archaeology And Collaborative Research, Fabrizio Galeazzi, Heather Richards-Rissetto

Department of Anthropology: Faculty Publications

While digital technologies have been part of archaeology for more than fifty years, archaeologists still look for more efficient methodologies to integrate digital practices of fieldwork recording with data management, analysis, and ultimately interpretation.This Special Issue of the Journal of Field Archaeology gathers international scholars affiliated with universities, organizations, and commercial enterprises working in the field of Digital Archaeology. Our goal is to offer a discussion to the international academic community and practitioners. While the approach is interdisciplinary, our primary audience remains readers interested in web technology and collaborative platforms in archaeology


Using Static Analysis And Dalvik Bytecode On Android Compass Applications To Detect Operational Anomalies, Arti J. Tripathi Jan 2018

Using Static Analysis And Dalvik Bytecode On Android Compass Applications To Detect Operational Anomalies, Arti J. Tripathi

Senior Projects Spring 2018

The focus of this paper is the functionality of Android applications and the detection of functional anomalies though a basic static analysis approach. The intention of this research is analyzing applications without running them and detecting how application behavior might correlate with method call patterns. We will focus on simple free compass applications because their ostensible simplicity will make high variation in methods calls an interesting phenomenon. We employ clustering algorithms and other statistical methods to isolate a particularly unusual collection of applications and then perform a qualitative analysis of these applications to discover any interesting common operational behavior or …