Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

Missouri University of Science and Technology

Theses/Dissertations

2013

Keyword
Publication

Articles 1 - 16 of 16

Full-Text Articles in Physical Sciences and Mathematics

Exploring Run-Time Reduction In Programming Codes Via Query Optimization And Caching, Venkata Krishna Suhas Nerella Jan 2013

Exploring Run-Time Reduction In Programming Codes Via Query Optimization And Caching, Venkata Krishna Suhas Nerella

Doctoral Dissertations

"Object oriented programming languages raised the level of abstraction by supporting the explicit first class query constructs in the programming codes. These query constructs allow programmers to express operations on collections more abstractly than relying on their realization in loops or through provided libraries. Join optimization techniques from the field of database technology support efficient realizations of such language constructs. However, the problem associated with the existing techniques such as query optimization in Java Query Language (JQL) incurs run time overhead. Besides the programming languages supporting first-class query constructs, the usage of annotations has also increased in the software engineering …


Efficient Integrity Verification Of Replicated Data In Cloud, Raghul Mukundan Jan 2013

Efficient Integrity Verification Of Replicated Data In Cloud, Raghul Mukundan

Masters Theses

"The cloud computing is an emerging model in which computing infrastructure resources are provided as a service over the Internet. Data owners can outsource their data by remotely storing them in the cloud and enjoy on-demand high quality services from a shared pool of configurable computing resources. By using these data storage services, the data owners can relieve the burden of local data storage and maintenance. However, since data owners and the cloud servers are not in the same trusted domain, the outsourced data may be at risk as the cloud server may no longer be fully trusted. Therefore, data …


Secure Design Defects Detection And Correction, Wenquan Wang Jan 2013

Secure Design Defects Detection And Correction, Wenquan Wang

Masters Theses

"Bad design and software defects often make source codes hard to understand and lead to maintenance difficulties. In order to detect and fix such defects, researchers have systematically investigated these issues and designed different effective algorithms to tackle the problems. However, most of these methods need source codes/models for defect detection and correction. Commercial companies, like banks, may not be willing to provide their source models due to data security. Therefore, it is a huge challenge to detect software detects by a consulting company as well as to keep source models confidential. This thesis analyze security issues in existing approaches …


Location Based Services In Wireless Ad Hoc Networks, Neelanjana Dutta Jan 2013

Location Based Services In Wireless Ad Hoc Networks, Neelanjana Dutta

Doctoral Dissertations

"In this dissertation, we investigate location based services in wireless ad hoc networks from four different aspects - i) location privacy in wireless sensor networks (privacy), ii) end-to-end secure communication in randomly deployed wireless sensor networks (security), iii) quality versus latency trade-off in content retrieval under ad hoc node mobility (performance) and iv) location clustering based Sybil attack detection in vehicular ad hoc networks (trust). The first contribution of this dissertation is in addressing location privacy in wireless sensor networks. We propose a non-cooperative sensor localization algorithm showing how an external entity can stealthily invade into the location privacy of …


Privacy-Preserving Friend Recommendations In Online Social Networks, Bharath Kumar Samanthula Jan 2013

Privacy-Preserving Friend Recommendations In Online Social Networks, Bharath Kumar Samanthula

Doctoral Dissertations

"Online social networks, such as Facebook and Google+, have been emerging as a new communication service for users to stay in touch and share information with family members and friends over the Internet. Since the users are generating huge amounts of data on social network sites, an interesting question is how to mine this enormous amount of data to retrieve useful information. Along this direction, social network analysis has emerged as an important tool for many business intelligence applications such as identifying potential customers and promoting items based on their interests. In particular, since users are often interested to make …


Verification Of Information Flow Security In Cyber-Physical Systems, Rav Akella Jan 2013

Verification Of Information Flow Security In Cyber-Physical Systems, Rav Akella

Doctoral Dissertations

"With a growing number of real-world applications that are dependent on computation, securing the information space has become a challenge. The security of information in such applications is often jeopardized by software and hardware failures, intervention of human subjects such as attackers, incorrect design specification and implementation, other social and natural causes. Since these applications are very diverse, often cutting across disciplines a generic approach to detect and mitigate these issues is missing. This dissertation addresses the fundamental problem of verifying information security in a class of real world applications of computation, the Cyber-physical systems (CPSs). One of the motivations …


Polarization And Opinion Analysis In An Online Argumentation System For Collaborative Decision Support, Ravi Santosh Arvapally Jan 2013

Polarization And Opinion Analysis In An Online Argumentation System For Collaborative Decision Support, Ravi Santosh Arvapally

Doctoral Dissertations

"Argumentation is an important process in a collaborative decision making environment. Argumentation from a large number of stakeholders often produces a large argumentation tree. It is challenging to comprehend such an argumentation tree without intelligent analysis tools. Also, limited decision support is provided for its analysis by the existing argumentation systems. In an argumentation process, stakeholders tend to polarize on their opinions, and form polarization groups. Each group is usually led by a group leader. Polarization groups often overlap and a stakeholder is a member of multiple polarization groups. Identifying polarization groups and quantifying a stakeholder's degree of membership in …


Social-Context Based Routing And Security In Delay Tolerant Networks, Roy A. Cabaniss Jan 2013

Social-Context Based Routing And Security In Delay Tolerant Networks, Roy A. Cabaniss

Doctoral Dissertations

"Delay Tolerant Networks (DTNs) were originally intended for interplanetary communications and have been applied to a series of difficult environments: wireless sensor networks, unmanned aerial vehicles, and short-range personal communications. There is a class of such environments in which nodes follow semi-predictable social patterns, such as wildlife tracking or personal devices. This work introduces a series of algorithms designed to identify the social patterns present in these environments and apply this data to difficult problems, such as efficient message routing and content distribution. Security is also difficult in a mobile environment. This is especially the case in the event that …


Women Authors Of Technical Writing Textbooks From 1923 To 1973, Melissa Nicole Wampler Jan 2013

Women Authors Of Technical Writing Textbooks From 1923 To 1973, Melissa Nicole Wampler

Masters Theses

"The published histories of technical writing textbooks do not usually include many women-authored textbooks. To find out why women-authored textbooks have been marginalized in these pedagogical histories, I selected seven women-authored textbooks and four men-authored textbooks published from 1923 to 1973, investigated the backgrounds of the authors and key features of their textbooks, and used the collected data to compare the women-authored textbooks to the men-authored textbooks. I was not able to find any reason why the women-authored textbooks have been or should be marginalized in histories of technical writing textbooks; however, my study had several limitations. My thesis begins …


Sybil Detection In Vehicular Networks, Muhammad Ibrahim Almutaz Jan 2013

Sybil Detection In Vehicular Networks, Muhammad Ibrahim Almutaz

Masters Theses

"A Sybil attack is one where an adversary assumes multiple identities with the purpose of defeating an existing reputation system. When Sybil attacks are launched in vehicular networks, an added challenge in detecting malicious nodes is mobility that makes it increasingly difficult to tie a node to the location of attacks. In this thesis, we present an innovative protocol for Sybil detection in vehicular networks. Considering that vehicular networks are cyber-physical systems integrating cyber and physical components, our technique exploits well grounded results in the physical (i.e., transportation) domain to tackle the Sybil problem in the cyber domain. Compared to …


Security Analysis Of A Cyber Physical System : A Car Example, Jason Madden Jan 2013

Security Analysis Of A Cyber Physical System : A Car Example, Jason Madden

Masters Theses

"Deeply embedded Cyber Physical Systems (CPS) are infrastructures that have significant cyber and physical components that interact with each other in complex ways. These interactions can violate a system's security policy, leading to the leakage of rights and unintended information flow. This thesis will explore information flow as it uses a public channel. In order to exemplify the use of the public channel, a vehicle being composed of the computer system and its operators will show how information is disclosed to an observer. The example is made up of a vehicle traveling across some terrain with an observer watching the …


Assessment Of An Enterprise Employee Portal Using Dashboard Monitoring System: A Case Study, Aditi Mishra Jan 2013

Assessment Of An Enterprise Employee Portal Using Dashboard Monitoring System: A Case Study, Aditi Mishra

Masters Theses

"A portal is a browser-based application that provides a web platform for users to improve inter-department collaboration and customer service. Portals are classified either as internal facing portals or external public facing portals. This study addresses the problems facing an internal portal related to its contents, functions and usability and provides a list of essential contents and functions that it should include through integrating theories and industry best practices. The theory framework is based on literature review and the industry best practices are based on the analysis of a number of internal portals of companies used as case studies. These …


Shopping Alone Online Vs. Co-Browsing: A Physiological And Perceptual Comparison, Ceren Topaloglu Jan 2013

Shopping Alone Online Vs. Co-Browsing: A Physiological And Perceptual Comparison, Ceren Topaloglu

Masters Theses

"Although shopping is a social activity frequently performed with friends and family members, most online shopping is done alone. With the development of Web 2.0 technologies and the increasing popularity of social networking sites, online social shopping has emerged as a new phenomenon that allows more social interaction, participation, and satisfaction for customers while shopping online. Therefore, companies have started to use social shopping tools in their e-commerce websites to facilitate online social shopping. Co-browsing is one of the more recent online social shopping tools available, enabling users to shop or browse together by offering synchronized web views and chat …


Search-Based Model Summarization, Lokesh Krishna Ravichandran Jan 2013

Search-Based Model Summarization, Lokesh Krishna Ravichandran

Masters Theses

"Large systems are complex and consist of numerous components and interactions between the components. Hence managing such large systems is a cumbersome and time consuming task. Large systems are usually described at the model level. But the large number of components in such models makes it difficult to modify. As a consequence, developers need a solution to rapidly detect which model components to revise. Effective solution is to generate a model summary. Although existing techniques are powerful enough to provide good summaries based on lexical information (relevant terms), they do not make use of structural information (component structure) well. In …


Hybridizing And Applying Computational Intelligence Techniques, Jeffery Scott Shelburg Jan 2013

Hybridizing And Applying Computational Intelligence Techniques, Jeffery Scott Shelburg

Masters Theses

"As computers are increasingly relied upon to perform tasks of increasing complexity affecting many aspects of society, it is imperative that the underlying computational methods performing the tasks have high performance in terms of effectiveness and scalability. A common solution employed to perform such complex tasks are computational intelligence (CI) techniques. CI techniques use approaches influenced by nature to solve problems in which traditional modeling approaches fail due to impracticality, intractability, or mathematical ill-posedness. While CI techniques can perform considerably better than traditional modeling approaches when solving complex problems, the scalability performance of a given CI technique alone is not …


Lexis In Chemical Engineering Discourse: Analyzing Style In Chemical Engineering Research Articles Through A Rhetorical Lens, David Lamar Young Jan 2013

Lexis In Chemical Engineering Discourse: Analyzing Style In Chemical Engineering Research Articles Through A Rhetorical Lens, David Lamar Young

Masters Theses

"This study examines the style of chemical engineering research articles to discover stylistic trends that may be applicable to authors looking to publish their own research. Rhetorical stylistic analysis was used as a research method to allow for thorough analysis of all articles in the sample. Ten research articles from the two prominent chemical engineering journals were chosen using specific criteria to constitute a sample of articles that could most accurately represent the population of chemical engineering research articles. Each article was then analyzed line by line to identify markers of chemical engineering research article style, including the following: ▬Use …