Open Access. Powered by Scholars. Published by Universities.®

Other Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

2007

Discipline
Institution
Keyword
Publication
Publication Type

Articles 1 - 13 of 13

Full-Text Articles in Other Computer Engineering

Back-Up Server For Computer Science Department, Victoria Gaylord Oct 2007

Back-Up Server For Computer Science Department, Victoria Gaylord

Mahurin Honors College Capstone Experience/Thesis Projects

Because Western Kentucky University does not maintain a back-up system for its departments, the Computer Science Department has implemented its own. Using Bacula software on a Unix server, files from faculty desktop computers and servers are backed up to a tape drive on a daily basis. The server is protected from outside threats with a carefully configured firewall script. This paper explains how both the firewall and the back-up software were implemented and how successful that implementation has been.


Desitv - The Indian Tv, Saurin Shah Oct 2007

Desitv - The Indian Tv, Saurin Shah

Mahurin Honors College Capstone Experience/Thesis Projects

DesiTV – The Indian TV project would utilize latest technology to provide live channels from the Indian Television World to Online World. The project would hence serve Indian demographic providing regional entertainment. It would contribute to the knowledge on how to utilize new technology and use it to provide better entertainment to the online users. Additionally, the project would help in learning how to build website/blog, how to host/post content and how to set up servers for broadcasting live channels. Also, how to maintain servers downtime and provide technical support. It would also contribute in the learning of how to …


Inventions On Auto-Configurable Gui-A Triz Based Analysis, Umakant Mishra Sep 2007

Inventions On Auto-Configurable Gui-A Triz Based Analysis, Umakant Mishra

Umakant Mishra

A GUI is intended for the end user but designed by the developer. Even the experienced developer cannot realistically anticipate what options will be required by the users at a future point of time. Besides, even a well-designed GUI may not be felt convenient to all categories of users as the skill, expertise and requirement of the users vary from each other.

Although the user can best describe his requirement and therefore can best configure the GUI, it is not advisable for the user to spend time and effort to configure the GUI. The user interface needs to be customized …


Sexual Conflict Over Egg Allocation: A Dynamic Programming Approach To Modeling The Evolution Of Male Harm And Female Resistance, David Kelley May 2007

Sexual Conflict Over Egg Allocation: A Dynamic Programming Approach To Modeling The Evolution Of Male Harm And Female Resistance, David Kelley

Honors Capstone Projects - All

Sexual conflict, which is expected to be ubiquitous among polygamous species, is known to occasionally result in male adaptations that are harmful to females. One theoretical model indicates that males may benefit from physically harming their mates by triggering a “terminal investment” reproductive response by them. Using dynamic programming, we explore how females optimize their lifetime egg allocation, how selection acts on males to exploit such allocation, and how females respond to resist this exploitation. The model reveals alternative female response pathways; one of the most effective of which is simply to forgo plasticity in egg allocation. By switching to …


Accessible Interactive Campus Mapping System For Syracuse University/Suny-Esf, Aaron C. Knight May 2007

Accessible Interactive Campus Mapping System For Syracuse University/Suny-Esf, Aaron C. Knight

Honors Capstone Projects - All

This written component of my Capstone Thesis in Computer Science covers the conceptualization and realization, and the process in between those stages, of my project, the Syracuse University Accessible Interactive Campus Map system. The system in its present state is launched at http://map.syr.edu. This project creates a usable and useful map and directions system for the Syracuse University and SUNY-ESF communities, which have long suffered without any properly oriented or fully functional map, much less an online one of any use. What this project also does is turn the Syracuse University Accessibility Map, produced by the Office of Disability Services …


Evaluating Software Engineering Processes In Commercial And Community Open Source Projects, Tony Wasserman, Eugenio Capra Apr 2007

Evaluating Software Engineering Processes In Commercial And Community Open Source Projects, Tony Wasserman, Eugenio Capra

Tony Wasserman

We describe a current study for obtaining information about management of commercial and community open source projects. We have interviewed and surveyed leaders of more than 75 open source projects. Questions focused on the styles of leadership and communication, with a technical focus on testing and quality assurance processes. This paper describes the methods used to identify and contact subjects, as well as the questions posed and some results.


Using Concept Maps To More Efficiently Create Intelligence Information Models, Christopher E. Coryell Mar 2007

Using Concept Maps To More Efficiently Create Intelligence Information Models, Christopher E. Coryell

Theses and Dissertations

Information models are a critical tool that enables intelligence customers to quickly and accurately comprehend U.S. intelligence agency products. The Knowledge Pre-positioning System (KPS) is the standard repository for information models at the National Air and Space Intelligence Center (NASIC). The current approach used by NASIC to build a KPS information model is laborious and costly. Intelligence analysts design an information model using a manual, butcher-paper-based process. The output of their work is then entered into KPS by either a single NASIC KPS "database modeler" or a contractor (at a cost of roughly $100K to the organization). This thesis proposes …


A Study Of Rootkit Stealth Techniques And Associated Detection Methods, Daniel D. Nerenberg Mar 2007

A Study Of Rootkit Stealth Techniques And Associated Detection Methods, Daniel D. Nerenberg

Theses and Dissertations

In today's world of advanced computing power at the fingertips of any user, we must constantly think of computer security. Information is power and this power is had within our computer systems. If we cannot trust the information within our computer systems then we cannot properly wield the power that comes from such information. Rootkits are software programs that are designed to develop and maintain an environment in which malware may hide on a computer system after successful compromise of that computer system. Rootkits cut at the very foundation of the trust that we put in our information and subsequent …


A Map Estimator For Simultaneous Superresolution And Detector Nonunifomity Correct, Russell C. Hardie, Douglas R. Droege Jan 2007

A Map Estimator For Simultaneous Superresolution And Detector Nonunifomity Correct, Russell C. Hardie, Douglas R. Droege

Electrical and Computer Engineering Faculty Publications

During digital video acquisition, imagery may be degraded by a number of phenomena including undersampling, blur, and noise. Many systems, particularly those containing infrared focal plane array (FPA) sensors, are also subject to detector nonuniformity. Nonuniformity, or fixed pattern noise, results from nonuniform responsivity of the photodetectors that make up the FPA. Here we propose a maximuma posteriori (MAP) estimation framework for simultaneously addressing undersampling, linear blur, additive noise, and bias nonuniformity. In particular, we jointly estimate a superresolution (SR) image and detector bias nonuniformity parameters from a sequence of observed frames. This algorithm can be applied to video in …


Some Peer-To-Peer, Democratically And Voluntarily Produced Thoughts About 'The Wealth Of Networks: How Social Production Transforms Markets And Freedom,' By Yochai Benkler, Ann Bartow Jan 2007

Some Peer-To-Peer, Democratically And Voluntarily Produced Thoughts About 'The Wealth Of Networks: How Social Production Transforms Markets And Freedom,' By Yochai Benkler, Ann Bartow

Law Faculty Scholarship

In this review essay, Bartow concludes that The Wealth of Networks: How Social Production Transforms Markets and Freedom by Yochai Benkler is a book well worth reading, but that Benkler still has a bit more work to do before his Grand Unifying Theory of Life, The Internet, and Everything is satisfactorily complete. It isn't enough to concede that the Internet won't benefit everyone. He needs to more thoroughly consider the ways in which the lives of poor people actually worsen when previously accessible information, goods and services are rendered less convenient or completely unattainable by their migration online. Additionally, the …


Pi-Calculus In Logical Form, Marcello M. Bonsangue, Alexander Kurz Jan 2007

Pi-Calculus In Logical Form, Marcello M. Bonsangue, Alexander Kurz

Engineering Faculty Articles and Research

Abramsky’s logical formulation of domain theory is extended to encompass the domain theoretic model for picalculus processes of Stark and of Fiore, Moggi and Sangiorgi. This is done by defining a logical counterpart of categorical constructions including dynamic name allocation and name exponentiation, and showing that they are dual to standard constructs in functor categories. We show that initial algebras of functors defined in terms of these constructs give rise to a logic that is sound, complete, and characterises bisimilarity. The approach is modular, and we apply it to derive a logical formulation of pi-calculus. The resulting logic is a …


Using Flossmole Data In Determining Business Readiness Ratings, Tony Wasserman, Ashutosh Das Dec 2006

Using Flossmole Data In Determining Business Readiness Ratings, Tony Wasserman, Ashutosh Das

Tony Wasserman

This paper is a preliminary report on using FLOSSmole data retrieved from open source repositories (forges) to calculate Business Readiness Rating scores.


Methods And Tools For Developing Interactive Information Systems: An Historical Perspective, Tony Wasserman Dec 2006

Methods And Tools For Developing Interactive Information Systems: An Historical Perspective, Tony Wasserman

Tony Wasserman

This paper describes the evolution of hardware and software technology over the past three decades, focusing on approaches for building interactive information systems and web applications. Successive generations of technology have used advances in hardware and software technology, along with increasingly sophisticated development methods and tools, to reduce development times and to produce a better user experience. After describing the key technology characteristics of each generation, this paper also describes the evolution of a specific methodology, User Software Engineering, from its origins in the 1970’s to its applicability to the development of modern applications.