Open Access. Powered by Scholars. Published by Universities.®

Other Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Other Computer Engineering

Sexual Conflict Over Egg Allocation: A Dynamic Programming Approach To Modeling The Evolution Of Male Harm And Female Resistance, David Kelley May 2007

Sexual Conflict Over Egg Allocation: A Dynamic Programming Approach To Modeling The Evolution Of Male Harm And Female Resistance, David Kelley

Honors Capstone Projects - All

Sexual conflict, which is expected to be ubiquitous among polygamous species, is known to occasionally result in male adaptations that are harmful to females. One theoretical model indicates that males may benefit from physically harming their mates by triggering a “terminal investment” reproductive response by them. Using dynamic programming, we explore how females optimize their lifetime egg allocation, how selection acts on males to exploit such allocation, and how females respond to resist this exploitation. The model reveals alternative female response pathways; one of the most effective of which is simply to forgo plasticity in egg allocation. By switching to …


Accessible Interactive Campus Mapping System For Syracuse University/Suny-Esf, Aaron C. Knight May 2007

Accessible Interactive Campus Mapping System For Syracuse University/Suny-Esf, Aaron C. Knight

Honors Capstone Projects - All

This written component of my Capstone Thesis in Computer Science covers the conceptualization and realization, and the process in between those stages, of my project, the Syracuse University Accessible Interactive Campus Map system. The system in its present state is launched at http://map.syr.edu. This project creates a usable and useful map and directions system for the Syracuse University and SUNY-ESF communities, which have long suffered without any properly oriented or fully functional map, much less an online one of any use. What this project also does is turn the Syracuse University Accessibility Map, produced by the Office of Disability Services …


Using Concept Maps To More Efficiently Create Intelligence Information Models, Christopher E. Coryell Mar 2007

Using Concept Maps To More Efficiently Create Intelligence Information Models, Christopher E. Coryell

Theses and Dissertations

Information models are a critical tool that enables intelligence customers to quickly and accurately comprehend U.S. intelligence agency products. The Knowledge Pre-positioning System (KPS) is the standard repository for information models at the National Air and Space Intelligence Center (NASIC). The current approach used by NASIC to build a KPS information model is laborious and costly. Intelligence analysts design an information model using a manual, butcher-paper-based process. The output of their work is then entered into KPS by either a single NASIC KPS "database modeler" or a contractor (at a cost of roughly $100K to the organization). This thesis proposes …


A Study Of Rootkit Stealth Techniques And Associated Detection Methods, Daniel D. Nerenberg Mar 2007

A Study Of Rootkit Stealth Techniques And Associated Detection Methods, Daniel D. Nerenberg

Theses and Dissertations

In today's world of advanced computing power at the fingertips of any user, we must constantly think of computer security. Information is power and this power is had within our computer systems. If we cannot trust the information within our computer systems then we cannot properly wield the power that comes from such information. Rootkits are software programs that are designed to develop and maintain an environment in which malware may hide on a computer system after successful compromise of that computer system. Rootkits cut at the very foundation of the trust that we put in our information and subsequent …