Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Physical Sciences and Mathematics

Exploring Techniques For Vision Based Human Activity Recognition: Methods, Systems, And Evaluation, Xin Xu, Jinshan Tang, Xiaolong Zhang, Xiaoming Liu, Hong Zhang, Yimin Qiu Jan 2013

Exploring Techniques For Vision Based Human Activity Recognition: Methods, Systems, And Evaluation, Xin Xu, Jinshan Tang, Xiaolong Zhang, Xiaoming Liu, Hong Zhang, Yimin Qiu

Michigan Tech Publications

With the wide applications of vision based intelligent systems, image and video analysis technologies have attracted the attention of researchers in the computer vision field. In image and video analysis, human activity recognition is an important research direction. By interpreting and understanding human activity, we can recognize and predict the occurrence of crimes and help the police or other agencies react immediately. In the past, a large number of papers have been published on human activity recognition in video and image sequences. In this paper, we provide a comprehensive survey of the recent development of the techniques, including methods, systems, …


Conversion Of Domain Type Enforcement Language To The Java Security Manager, James Walker Jan 2013

Conversion Of Domain Type Enforcement Language To The Java Security Manager, James Walker

Dissertations, Master's Theses and Master's Reports - Open

With today's prevalence of Internet-connected systems storing sensitive data and the omnipresent threat of technically skilled malicious users, computer security remains a critically important field. Because of today's multitude of vulnerable systems and security threats, it is vital that computer science students be taught techniques for programming secure systems, especially since many of them will work on systems with sensitive data after graduation. Teaching computer science students proper design, implementation, and maintenance of secure systems is a challenging task that calls for the use of novel pedagogical tools. This report describes the implementation of a compiler that converts mandatory access …


An Experience-Driven Pedagogy For The Instruction Of Software Testing In Computer Science, Christopher Duane Brown Jan 2013

An Experience-Driven Pedagogy For The Instruction Of Software Testing In Computer Science, Christopher Duane Brown

Dissertations, Master's Theses and Master's Reports - Open

In the realm of computer programming, the experience of writing a program is used to reinforce concepts and evaluate ability. This research uses three case studies to evaluate the introduction of testing through Kolb's Experiential Learning Model (ELM). We then analyze the impact of those testing experiences to determine methods for improving future courses.

The first testing experience that students encounter are unit test reports in their early courses. This course demonstrates that automating and improving feedback can provide more ELM iterations. The JUnit Generation (JUG) tool also provided a positive experience for the instructor by reducing the overall workload. …