Open Access. Powered by Scholars. Published by Universities.®

Other Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Discipline
Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 1351 - 1380 of 1402

Full-Text Articles in Other Computer Engineering

Toward A User-Centered I2-Enabled Collaborative Learning And Teaching Environment: The Cal Poly Scandinavian Style Participatory Design Project, Helen Y. Chu, Franz Kurfess, David Gillette, Craig Schultz, Mary Somerville, Marita Holst, Peter Lundkvist, Anita Mirijamdotter, Robert Sundlof, Seppo Tanskanen, Markus Tiburzi Sep 2005

Toward A User-Centered I2-Enabled Collaborative Learning And Teaching Environment: The Cal Poly Scandinavian Style Participatory Design Project, Helen Y. Chu, Franz Kurfess, David Gillette, Craig Schultz, Mary Somerville, Marita Holst, Peter Lundkvist, Anita Mirijamdotter, Robert Sundlof, Seppo Tanskanen, Markus Tiburzi

Helen Y. Chu

Information Technology Services and the University Library partnered to build an Internet2-enabled Learning Commons (LC) at California Polytechnic State University in San Luis Obispo. The project team now extends the campus partnership model to include student and faculty users in collaboratively applying Scandinavian style co-design methodologies for physical and virtual learning and teaching environments. The interactive design approach was tested from January to June 2005 with funding from a U.S. Office of Naval Research Internet2 MiniGrant subcontract award. The project evaluated the efficacy of an interactive design/redesign methodology for encouraging user-driven, boundary-crossing information exchange and knowledge creation. Involving graduate and …


Inventions On Dialog Boxes Used In Gui, Umakant Mishra Sep 2005

Inventions On Dialog Boxes Used In Gui, Umakant Mishra

Umakant Mishra

The dialog boxes are useful in case of displaying warnings, errors, confirmations etc. in special situations. A typical dialog box is displayed in a small window with some text message along with a few options for the user to select. However, there are certain difficulties associated in programming and implementing a conventional dialog box, such as, severe programming effort, rigidity of the hard coded message, obscuring screen space and so on. There is a need to overcome these difficulties of the dialog box to make them more efficient and useful. The modality of the dialog boxes also creates some limitations. …


Inventions On Tree Navigators Used In Graphical User Interface, Umakant Mishra Sep 2005

Inventions On Tree Navigators Used In Graphical User Interface, Umakant Mishra

Umakant Mishra

A tree view or tree navigator is used to display hierarchical data organized in the form of a tree. In a tree structure there are parent and child nodes. The child nodes may further have descendants to n levels. There are many methods to make the navigation easy. Some of these are expanding and collapsing branches, splitting the tree, displaying a parent node in a separate tree, zooming branches, scrolling in various directions etc. It is still a difficult exercise to handle large trees efficiently. The effort still continues to manage large number of nodes with faster speed, greater control, …


10 Inventions On Scrolling And Scrollbars In Graphical User Interface, Umakant Mishra Aug 2005

10 Inventions On Scrolling And Scrollbars In Graphical User Interface, Umakant Mishra

Umakant Mishra

Scrolling mechanism is used to display and edit large documents in a limited screen space or window. The scrolling mechanism may include a vertical scroll bar or a horizontal scroll bar or both to move the contents of the documents up and down or left and right. There may be navigation buttons on the screen representing the navigation keys on the keyboard. The user can click these buttons to scroll the screen. There may be very different methods of scrolling such as by using the “thumb”, as popularly used with a pdf document. Scrolling may be achieved through eyeball tracking …


A Case-Based Technique For Tracking Concept Drift In Spam Filtering, Sarah Jane Delany, Padraig Cunningham, Alexey Tsymbal, Lorcan Coyle Aug 2005

A Case-Based Technique For Tracking Concept Drift In Spam Filtering, Sarah Jane Delany, Padraig Cunningham, Alexey Tsymbal, Lorcan Coyle

Articles

Spam filtering is a particularly challenging machine learning task as the data distribution and concept being learned changes over time. It exhibits a particularly awkward form of concept drift as the change is driven by spammers wishing to circumvent spam filters. In this paper we show that lazy learning techniques are appropriate for such dynamically changing contexts. We present a case-based system for spam filtering that can learn dynamically. We evaluate its performance as the case-base is updated with new cases. We also explore the benefit of periodically redoing the feature selection process to bring new features into play. Our …


Information Delivery On Mobile Devices Using Contour Icon Sonification, Charlie Cullen, Eugene Coyle Jan 2005

Information Delivery On Mobile Devices Using Contour Icon Sonification, Charlie Cullen, Eugene Coyle

Conference papers

This paper examines the use of musical patterns to convey information, specifically in the context of mobile devices. Existing mechanisms (such as the popularity of the Morse code SMS alert) suggest that the use of musical patterns on mobile devices can be a very efficient and powerful method of data delivery. Unique musical patterns based on templates known as Contour Icons are used to represent specific data variables, with the output rendering of these patterns being referred to as a Sonification of that data. Contour Icon patterns mimic basic shapes and structures, thus providing listeners with a means of categorising …


Trioson: A Graphical User Interface For Pattern Sonification, Charlie Cullen, Eugene Coyle Jan 2005

Trioson: A Graphical User Interface For Pattern Sonification, Charlie Cullen, Eugene Coyle

Conference papers

The TrioSon software allows users to map musical patterns to input data variables via a graphical user interface (GUI). The application is a Java routine designed to take input files of standard Comma Separated Values (CSV) format and output Standard Midi Files (SMF) using the internal Java Sound API. TrioSon renders output Sonifications from input data files for up to 3 user-defined parameters, allocated as bass, chord and melody instruments for the purposes of arrangement. In this manner each parameter concerned is distinguished by its individual instrumental timbre, with the option of rendering any combination of 1 to 3 parameters …


Information Delivery On Mobile Devices Using Boolean Sonification Patterns, Charlie Cullen, Eugene Coyle Jan 2005

Information Delivery On Mobile Devices Using Boolean Sonification Patterns, Charlie Cullen, Eugene Coyle

Conference papers

Sonification is the means by which non-speech audio can be used to convey information. Existing work has produced methods for delivering information in a wide range of fields, and recent work has considered the huge potential of mobile devices for Sonification. Boolean Sonification is a method of defining two related musical patterns as boolean conditions (true/false, yes/no etc.), such that one is considered contrary to the other by the listener. The final pattern set ideally comprises of two musical events that are closely enough related as to be considered a group, yet distinct enough to be perceived as separate entities. …


Weak Factorizations, Fractions And Homotopies, Alexander Kurz, Jiří Rosický Jan 2005

Weak Factorizations, Fractions And Homotopies, Alexander Kurz, Jiří Rosický

Engineering Faculty Articles and Research

We show that the homotopy category can be assigned to any category equipped with a weak factorization system. A classical example of this construction is the stable category of modules. We discuss a connection with the open map approach to bisimulations proposed by Joyal, Nielsen and Winskel.


Jess – A Java Security Scanner For Eclipse, Russell Spitler Jan 2005

Jess – A Java Security Scanner For Eclipse, Russell Spitler

Honors Theses

Secure software is the responsibility of every developer. In order to help a developer with this responsibility there are many automated source code security auditors. These tools perform a variety of functions, from finding calls to insecure functions to poorly generated random numbers. These programs have existed for years and perform the security audit with varying degrees of success.

Largely missing in the world of programming is such a security auditor for the Java programming language. Currently, Fortify Software produces the only Java source code security auditor; this is a commercially available package.

This void is what inspired JeSS, Java …


Software Development Project Risk Management: A Literature Review, Kevin Macg. Adams, C. Ariel Pinto Jan 2005

Software Development Project Risk Management: A Literature Review, Kevin Macg. Adams, C. Ariel Pinto

Engineering Management & Systems Engineering Faculty Publications

The rapid and unprecedented growth in software has brought with it some of the most spectacular and costly project failures in modern history. How risk management is presented in the scholarly journals may give insight into the risk management methods and techniques in use on software development projects. This paper provides a glimpse into the risk management methods, methodologies and techniques available to those who are responsible for software development projects by conducting a non-experimental content analysis. The findings reveal that risk management has not received sufficient attention and does not appear to be widely accepted within the software engineering …


Analysis Of Data Sets Using Trio Sonification, Charlie Cullen, Eugene Coyle Jan 2004

Analysis Of Data Sets Using Trio Sonification, Charlie Cullen, Eugene Coyle

Conference papers

Recent advances in technology have suggested that sound and audio play a far greater part in our daily working lives than ever before. Mobile phone ring tones are now based upon polyphonic music sequences that allow relatively complex audio to be generated from a handset by way of conveying information (i.e. a call or message is incoming). This real world example of sonification suggests that far more could be made of sonification techniques for analysis- particularly in the business environment. One advantage of sonification is its relatively hands free nature in that once a sequence is being played it does …


Software For Seismic And Vibration Analysis, Raman K. Attri Jan 2004

Software For Seismic And Vibration Analysis, Raman K. Attri

Raman K. Attri

No abstract provided.


Orchestration Within The Sonification Of Basic Data Sets, Charlie Cullen, Eugene Coyle Jan 2004

Orchestration Within The Sonification Of Basic Data Sets, Charlie Cullen, Eugene Coyle

Conference papers

The use of sonification as a means of representing and analysing data has become a growing field of research in recent years and as such has become a far more accepted means of working with data. Existing work carried out as part of this research has focused primarily on the sonification of DNA/RNA sequences and their subsequent protein structures for the purposes of analysis. This sonification work raised many questions as regards the need for sequences to be set to music in a standard manner so that different strands could be analysed by comparison, and hence the orchestration and instrumentation …


Preface, Thomas Hildebrandt, Alexander Kurz Jan 2004

Preface, Thomas Hildebrandt, Alexander Kurz

Engineering Faculty Articles and Research

No abstract provided.


Algebraic Semantics For Coalgebraic Logics, Clemens Kupke, Alexander Kurz, Dirk Pattinson Jan 2004

Algebraic Semantics For Coalgebraic Logics, Clemens Kupke, Alexander Kurz, Dirk Pattinson

Engineering Faculty Articles and Research

With coalgebras usually being defined in terms of an endofunctor T on sets, this paper shows that modal logics for T-coalgebras can be naturally described as functors L on boolean algebras. Building on this idea, we study soundness, completeness and expressiveness of coalgebraic logics from the perspective of duality theory. That is, given a logic L for coalgebras of an endofunctor T, we construct an endofunctor L such that L-algebras provide a sound and complete (algebraic) semantics of the logic. We show that if L is dual to T, then soundness and completeness of the algebraic semantics immediately yield the …


Coalgebras And Modal Expansions Of Logics, Alexander Kurz, Alessandra Palmigiano Jan 2004

Coalgebras And Modal Expansions Of Logics, Alexander Kurz, Alessandra Palmigiano

Engineering Faculty Articles and Research

In this paper we construct a setting in which the question of when a logic supports a classical modal expansion can be made precise. Given a fully selfextensional logic S, we find sufficient conditions under which the Vietoris endofunctor V on S-referential algebras can be defined and we propose to define the modal expansions of S as the logic that arises from the V-coalgebras. As an example, we also show how the Vietoris endofunctor on referential algebras extends the Vietoris endofunctor on Stone spaces. From another point of view, we examine when a category of ‘spaces’ (X,A), ie sets X …


Development Of Software For Seismic & Vibration Analysis, Raman K. Attri Dec 2003

Development Of Software For Seismic & Vibration Analysis, Raman K. Attri

Raman K. Attri

Earthquake risk management is an issue of international priority since many countries in the world are affected adversely by sudden earthquake. Frequent earthquakes are being encountered in many parts of the world every year. Recently India had some earthquake in latur, chamoli, Utrakanshi, Bhuj regions. The occurrence of earthquake has been on increase due to geographical changes taking place under the earth crust all over world. The heavy and unpredictable loss of life and destruction of resources have forced the seismologist and instrumentation engineers to develop sophisticated earth quake monitoring instruments with quick data analysis software. The latest development in …


Rhythmic Parsing Of Sonified Dna And Rna Sequences, Charlie Cullen, Eugene Coyle Jan 2003

Rhythmic Parsing Of Sonified Dna And Rna Sequences, Charlie Cullen, Eugene Coyle

Conference papers

Sonification allows existing mathematical data to be used as the model for audio output, notably that the audio produced is related to or representative of that data in some way. Existing work in the field has been largely focused on the aesthetic tailoring of the output audio for compositional benefit rather than as a framework for audio representation and analysis. It is the goal of this research to apply existing techniques for pitch substitution to an analytical method that seeks to define and represent patterns within existing data sets (primarily DNA and RNA sequences). It is often the case that …


Interpolation Techniques For Overset Grids, Paul S. Sherman, Nathan B. Edgar Jan 2003

Interpolation Techniques For Overset Grids, Paul S. Sherman, Nathan B. Edgar

Journal of the Arkansas Academy of Science

The use of finite difference schemes in computational aeroacoustics requires the use of structured grids incomputational space. Complex geometries in the physical space can be modeled using multiple overlapping grids that are transformed into computational space. In this work, finite difference schemes are used that necessitate the addition of psuedo- or ghost-points in the overlap region of the grids for closure of the difference stencil. The functional values at these ghost points must be approximated from the values at the original grid points. This paper investigates interpolation techniques for these overset grids. An n th order interpolation scheme using Lagrange …


Stone Coalgebras, Clemens Kupke, Alexander Kurz, Yde Venema Jan 2003

Stone Coalgebras, Clemens Kupke, Alexander Kurz, Yde Venema

Engineering Faculty Articles and Research

In this paper we argue that the category of Stone spaces forms an interesting base category for coalgebras, in particular, if one considers the Vietoris functor as an analogue to the power set functor. We prove that the so-called descriptive general frames, which play a fundamental role in the semantics of modal logics, can be seen as Stone coalgebras in a natural way. This yields a duality between the category of modal algebras and that of coalgebras over the Vietoris functor. Building on this idea, we introduce the notion of a Vietoris polynomial functor over the category of Stone spaces. …


Automatic Human Face Detection In Color Images, Son Lam Phung Jan 2003

Automatic Human Face Detection In Color Images, Son Lam Phung

Theses: Doctorates and Masters

Automatic human face detection in digital image has been an active area of research over the past decade. Among its numerous applications, face detection plays a key role in face recognition system for biometric personal identification, face tracking for intelligent human computer interface (HCI), and face segmentation for object-based video coding. Despite significant progress in the field in recent years, detecting human faces in unconstrained and complex images remains a challenging problem in computer vision. An automatic system that possesses a similar capability as the human vision system in detecting faces is still a far-reaching goal. This thesis focuses on …


A Study Of The Security Implications Involved With The Use Of Executable World Wide Web Content, Christopher Hu Jan 2003

A Study Of The Security Implications Involved With The Use Of Executable World Wide Web Content, Christopher Hu

Theses: Doctorates and Masters

Malicious executable code is nothing new. While many consider that the concept of malicious code began in the 1980s when the first PC viruses began to emerge, the concept does in fact date back even earlier. Throughout the history of malicious code, methods of hostile code delivery have mirrored prevailing patterns of code distribution. In the 1980s, file infecting and boot sector viruses were common, mirroring the fact that during this time, executable code was commonly transferred via floppy disks. Since the 1990s email has been a major vector for malicious code attacks. Again, this mirrors the fact that during …


Determining The Effectiveness Of Deceptive Honeynets, Nirbhay Gupta Jan 2003

Determining The Effectiveness Of Deceptive Honeynets, Nirbhay Gupta

Theses: Doctorates and Masters

Over the last few years, incidents of network based intrusions have rapidly increased, due to the increase and popularity of various attack tools easily available for download from the Internet. Due to this increase in intrusions, the concept of a network defence known as Honeypots developed. These honeypots are designed to ensnare attackers and monitor their activities. Honeypots use the principles of deception such as masking, mimicry, decoying, inventing, repackaging and dazzling to deceive attackers. Deception exists in various forms. It is a tactic to survive and defeat the motives of attackers. Due to its presence in the nature, deception …


Manufacturing Interoperability, Steven Ray, Al Jones Dec 2002

Manufacturing Interoperability, Steven Ray, Al Jones

Steven R Ray

As manufacturing and commerce become ever more global in nature, companies are increasingly dependent upon the efficient and effective exchange of information with their partners, wherever they may be. Leading manufacturers rely upon computers to perform this information exchange, which must therefore be encoded for electronic transmission. Because no single company can dictate that all its partners use the same software, standards for how the information is represented become critical for cost-effective, errorfree transmission of data. This paper discusses some interoperability issues related to current standards, and describes two projects underway at the National Institute of Standards and Technology in …


Interoperability Standards In The Semantic Web, Steven Ray Feb 2002

Interoperability Standards In The Semantic Web, Steven Ray

Steven R Ray

The growth in the use of the Internet brings with it an increase in the number of interconnections among information systems supporting the manufacturing supply chain as well as other businesses. Each of these interconnections must be carefully prescribed to ensure interoperability. However, the sheer number of interconnections and the resulting complexity threaten to overwhelm the ability of the standards community or industry to provide the necessary specifications—a way out of this impasse must be found. This paper outlines the elements of an approach and the technology to move toward self-integrating systems, wherein the systems negotiate meaningful interfaces as needed …


Modal Predicates And Coequations, Alexander Kurz, Jiří Rosický Jan 2002

Modal Predicates And Coequations, Alexander Kurz, Jiří Rosický

Engineering Faculty Articles and Research

We show how coalgebras can be presented by operations and equations. This is a special case of Linton’s approach to algebras over a general base category X, namely where X is taken as the dual of sets. Since the resulting equations generalise coalgebraic coequations to situations without cofree coalgebras, we call them coequations. We prove a general co-Birkhoff theorem describing covarieties of coalgebras by means of coequations. We argue that the resulting coequational logic generalises modal logic.


Definability, Canonical Models, And Compactness For Finitary Coalgebraic Modal Logic, Alexander Kurz, Dirk Pattinson Jan 2002

Definability, Canonical Models, And Compactness For Finitary Coalgebraic Modal Logic, Alexander Kurz, Dirk Pattinson

Engineering Faculty Articles and Research

This paper studies coalgebras from the perspective of the finitary observations that can be made of their behaviours. Based on the terminal sequence, notions of finitary behaviours and finitary predicates are introduced. A category Behω(T) of coalgebras with morphisms preserving finitary behaviours is defined. We then investigate definability and compactness for finitary coalgebraic modal logic, show that the final object in Behω(T) generalises the notion of a canonical model in modal logic, and study the topology induced on a coalgebra by the finitary part of the terminal sequence.


Preface, Alexander Kurz Jan 2002

Preface, Alexander Kurz

Engineering Faculty Articles and Research

No abstract provided.


Identification Of Shapes Using A Nonlinear Dynamic System, Shaheen Hoque, Sanza Kazadi, Angel Li, Will Chen, Elvio Sadun Jun 2001

Identification Of Shapes Using A Nonlinear Dynamic System, Shaheen Hoque, Sanza Kazadi, Angel Li, Will Chen, Elvio Sadun

Sanza Kazadi

We describe a nonlinear system capable of use as a recognition system. This system is composed of a set of coupled oscillators, connected by linear springs. Images are overlaid on the system by altering the masses and spring constants of the oscillators, thereby modifying the detailed behavior of the system. Signatures extracted from the system using FFT of the individual oscillator positions show coherance, relative continuity, and translational and rotational invariance. These properties are discussed in the context of the eventual use of this system as a general identification system.