Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

Selected Works

2007

Keyword
Publication
File Type

Articles 1 - 30 of 56

Full-Text Articles in Physical Sciences and Mathematics

Humancentric Applications Of Rfid Chips, S. Derrick, K. Michael, H. Tootell Dec 2012

Humancentric Applications Of Rfid Chips, S. Derrick, K. Michael, H. Tootell

Dr Holly Tootell

No abstract provided.


A Unit Of Information-Based Content Adaptation Method For Improving Web Content Accessibility In The Mobile Internet, Stephen Yang, Jia Zhang, Rick Chen, Norman Shao Nov 2007

A Unit Of Information-Based Content Adaptation Method For Improving Web Content Accessibility In The Mobile Internet, Stephen Yang, Jia Zhang, Rick Chen, Norman Shao

Jia Zhang

No abstract provided.


The Social Implications Of Enjoyment Of Different Types Of Music, Movies, And Television Programming, Alice Hall Nov 2007

The Social Implications Of Enjoyment Of Different Types Of Music, Movies, And Television Programming, Alice Hall

Alice Hall

This study investigated how information about an individual’s enjoyment of various genres of music, film, and TV programming could influence an observer’s expectations of that individual. An online survey of young adults found that the influence of information about another person’s genre preferences varied across genres. Enjoyment of some genres, including jazz music, film comedies, and television comedies, tended to raise expectations of the individual, whereas enjoyment of others, including heavy metal music, anime films, and television soap operas, tended to lower them. The implications of the findings are discussed in relation to uses and gratifications perspectives as well as …


Editing Tips For The Busy Attorney, Ariana R. Levinson Nov 2007

Editing Tips For The Busy Attorney, Ariana R. Levinson

Ariana R. Levinson

No abstract provided.


Assigning Trust To Wikipedia Content, B. Thomas Adler, Jason Benterou, Krishnendu Chatterjee, Luca De Alfaro, Ian Pye, Vishwa Raman Nov 2007

Assigning Trust To Wikipedia Content, B. Thomas Adler, Jason Benterou, Krishnendu Chatterjee, Luca De Alfaro, Ian Pye, Vishwa Raman

Luca de Alfaro

he Wikipedia is a collaborative encyclopedia: anyone can contribute to its articles simply by clicking on an ``edit'' button. The open nature of the Wikipedia has been key to its success, but has also created a challenge: how can readers form an informed opinion on its reliability? We propose a system that computes quantitative values of trust for the text in Wikipedia articles; these trust values provide an indication of text reliability.

The system uses as input the revision history of each article, as well as information about the reputation of the contributing authors, as provided by a reputation system. …


From Dataveillance To Überveillance (Uberveillance) And The Realpolitik Of The Transparent Society, K. Michael, M. G. Michael Oct 2007

From Dataveillance To Überveillance (Uberveillance) And The Realpolitik Of The Transparent Society, K. Michael, M. G. Michael

Professor Katina Michael

The 2007 Workshop on the Social Implications of National Security: from Dataveillance to Überveillance and the Realpolitik of the Transparent Society was organised by the Research Network for a Secure Australia (RNSA) funded by the Australian Research Council. The Workshop will become a biennial event bringing together both researchers and practitioners in the fields relating to the national research priority entitled Safeguarding Australia. In 2007, the workshop was held on the 29th October, at the Function Centre at the University of Wollongong between 8.30 am and 5.00 pm.

The Workshop was organised by RNSA members from the IP Location-Based Services …


From Dataveillance To Überveillance (Uberveillance) And The Realpolitik Of The Transparent Society, K. Michael, M. G. Michael Oct 2007

From Dataveillance To Überveillance (Uberveillance) And The Realpolitik Of The Transparent Society, K. Michael, M. G. Michael

M. G. Michael

The 2007 Workshop on the Social Implications of National Security: from Dataveillance to Überveillance and the Realpolitik of the Transparent Society was organised by the Research Network for a Secure Australia (RNSA) funded by the Australian Research Council. The Workshop will become a biennial event bringing together both researchers and practitioners in the fields relating to the national research priority entitled Safeguarding Australia. In 2007, the workshop was held on the 29th October, at the Function Centre at the University of Wollongong between 8.30 am and 5.00 pm.

The Workshop was organised by RNSA members from the IP Location-Based Services …


Electric Power: Cyber And Electromagnetic Security Issues, George H. Baker Oct 2007

Electric Power: Cyber And Electromagnetic Security Issues, George H. Baker

George H Baker

Electric power is essential to the functioning of U.S. society. The electric power system increasingly operates at or near its reliability limits. The geographic scale of the tightly coupled networks involved makes the system susceptible to large-scale outages. More frequent natural and accidental failures portend possible catastrophes from intentional disruption. Deregulation has been a major factor to the lack of investment in system upgrades. Techniques to prevent attacks and reduce vulnerabilities are available and affordable.


Topic And Role Discovery In Social Networks With Experiments On Enron And Academic Email, Andrew Mccallum, Xuerui Wang, Andrés Corrada-Emmanuel Oct 2007

Topic And Role Discovery In Social Networks With Experiments On Enron And Academic Email, Andrew Mccallum, Xuerui Wang, Andrés Corrada-Emmanuel

Andrés Corrada-Emmanuel

Previous work in social network analysis (SNA) has modeled the existence of links from one entity to another, but not the attributes such as language content or topics on those links. We present the Author-Recipient-Topic (ART) model for social network analysis, which learns topic distributions based on the direction-sensitive messages sent between entities. The model builds on Latent Dirichlet Allocation (LDA) and the Author-Topic (AT) model, adding the key attribute that distribution over topics is conditioned distinctly on both the sender and recipient---steering the discovery of topics according to the relationships between people. We give results on both the Enron …


"Conversational" Dialogues In Direct-Manipulation Interfaces, David G. Novick Oct 2007

"Conversational" Dialogues In Direct-Manipulation Interfaces, David G. Novick

David G. Novick

This paper reports ongoing research in extending direct-manipulation interfaces by incorporating, via the direct-manipulation modality itself, interaction techniques that add kinds of language features associated with spoken conversation. The paper proposes means of implementing ways for a user of a direct-manipulation system to define new kinds of relations among objects in the interface.


Users And Uses Of Synchronous Business Communications Software, David G. Novick, Eleanor Wynn Oct 2007

Users And Uses Of Synchronous Business Communications Software, David G. Novick, Eleanor Wynn

David G. Novick

To help designers and authors understand users' intentions and work practices for synchronous business communications in a systematic way, we used ethnographic and task-analytic techniques to collect, analyze and classify evidence of the activities of potential users as they conducted their work lives. The interactions we observed among our users took place through a variety of modalities. We found eight categories of tasks for the collaborative or interactive work in which our subjects engaged. Based on these data, we were able to classify roles of potential users of synchronous business communications software into a set of "archetypes" that characterize their …


Hands-Free Documentation, Karen Ward, David G. Novick Oct 2007

Hands-Free Documentation, Karen Ward, David G. Novick

David G. Novick

In this paper, we introduce an analysis of the requirements and design choices for hands-free documentation. Hands-busy tasks such as cooking or car repair may require substantial interruption of the task: moving the pan off the burner and wiping hands, or crawling out from underneath the car. We review the need for hands-free documentation and explore the role of task in the use of documentation. Our central analysis examines the roles and characteristics of input and output modalities of hands-free documentation. In particular, we review the use of speech as an input modality, and then visual means and speech as …


An Interaction Initiative Model For Documentation, David G. Novick, Karen Ward Oct 2007

An Interaction Initiative Model For Documentation, David G. Novick, Karen Ward

David G. Novick

In this paper we propose a model of creation and use of documentation based on the concept of mixed-initiative interaction. In our model, successful single-initiative interaction is characterized by grounding of contributions, and successful mixed-initiative interaction is characterized by both grounding and agreement. Just as in spoken conversation, achievement of actual agreement depends on the intentions of both parties; agreement is achieved when the reader follows the documentation’s instructions. In fact, readers are not obligated to—and often do not—act according to the author’s intentions. By making these dynamics explicit, the model can aid authors in developing effective documentation. The paper …


Assessing Effectiveness Of Personality Style In Documentation, Kenneth Sayles, David G. Novick Oct 2007

Assessing Effectiveness Of Personality Style In Documentation, Kenneth Sayles, David G. Novick

David G. Novick

This paper extends previous work by other researchers that indicated that users of computers preferred a computer with a personality that was similar to theirs. We conducted a similar experiment, but looking beyond preference to see if the personality of documentation would make a difference in the user’s performance. Our data suggest did not indicate that personality match affects performance; and if such a relationship exists it is likely to be weak. We discuss the related research, describe our methodology, present our results, and describe their implications and limitations.


Optimal Design Of Integrally Gated Cnt Field-Emission Devices Using A Genetic Algorithm, P. Y. Chen, Chien Hsun Chen, J. S. Wu, H. C. Wen, W. P. Wang Oct 2007

Optimal Design Of Integrally Gated Cnt Field-Emission Devices Using A Genetic Algorithm, P. Y. Chen, Chien Hsun Chen, J. S. Wu, H. C. Wen, W. P. Wang

Chien Hsun Chen

A method to optimize the focusing quality of integrally gated CNT field-emission (FE) devices by combining field-emission modeling and a computational intelligence technique, genetic algorithm (GA), is proposed and demonstrated. In this work, the e-beam shape, as a characteristic parameter of electron-optical properties, is calculated by field-emission simulation modeling. Using a design tool that combines GA and physical modeling, a set of structural and electrical parameters for four FE device groups, including double-gate, triple-gate, quadruple-gate and quintuple-gate type, were optimized. The resultant FE devices exhibit satisfactory e-beam focusabilities and the extracted parameters with the best performance for each type of …


A Service Supporting Universal Access To Mobile Internet With Unit Of Information-Based Intelligent Content Adaptation, Stephen Yang, Jia Zhang, Norman Shao, Rick Chen Jun 2007

A Service Supporting Universal Access To Mobile Internet With Unit Of Information-Based Intelligent Content Adaptation, Stephen Yang, Jia Zhang, Norman Shao, Rick Chen

Jia Zhang

No abstract provided.


Web 2.0 Services For Identifying Communities Of Practice Through Social Networks, Stephen Yang, Jia Zhang, Irene Chen Jun 2007

Web 2.0 Services For Identifying Communities Of Practice Through Social Networks, Stephen Yang, Jia Zhang, Irene Chen

Jia Zhang

No abstract provided.


Creating Database-Backed Library Web Pages Using Open Source Tools (Review), Frank J. Bove Jun 2007

Creating Database-Backed Library Web Pages Using Open Source Tools (Review), Frank J. Bove

Frank J. Bove

No abstract provided.


Clustering-Based High Trend Identification In Dataset, Dr. Muhammad Zubair Asghar, Dr. Auranzeb Khan, Fazal Masud Kundi, Nafees Ur Rehman Jun 2007

Clustering-Based High Trend Identification In Dataset, Dr. Muhammad Zubair Asghar, Dr. Auranzeb Khan, Fazal Masud Kundi, Nafees Ur Rehman

Dr. Muhammad Zubair Asghar

Clustering data into meaningful groups has a vast scope of research in several fields, like: statistics, information theory, machine learning, databases, and bioinformatics. This paper presents the modified form of K-means clustering algorithm called T-means. This algorithm creates, sorted clusters and labels as "high trend" and "low trend". Then M cases are selected from the high trend cluster (HTC) to construct the final HTC. The algorithm was tested on real univariate data of student's marks. Experimental results show that T-means can be efficiently used to construct the sorted cluster of significant cases in data set. T-means will help to identify …


Services Computing, Liang-Jie Zhang, Jia Zhang, Hong Cai May 2007

Services Computing, Liang-Jie Zhang, Jia Zhang, Hong Cai

Jia Zhang

This book bridges the gap between Business and IT services. It describes research results in Web services and service-oriented architecture (SOA); business consulting methodology and utilities; and business process modeling, transformation, integration, and management. Major solution architectures, technologies and research methods are discussed in the lifecycle of services innovation research, including business componentization; services modeling, creation, realization, annotation, deployment, discovery, composition and delivery; service-to-service collaboration; and services monitoring, optimization, and management. The book provides readers with new research and solution methods to enable IT services and computing technology to better create and manage business services, which is the goal of …


Supporting Ad-Hoc Resource Sharing On The Web: A Peer-To-Peer Approach To Hypermedia Link Services, Jing Zhou, Wendy Hall, David De Roure, Vijay Dialani Apr 2007

Supporting Ad-Hoc Resource Sharing On The Web: A Peer-To-Peer Approach To Hypermedia Link Services, Jing Zhou, Wendy Hall, David De Roure, Vijay Dialani

Vijay Dialani

The key element to support ad-hoc resource sharing on the Web is to discover resources of interest. The hypermedia paradigm provides a way of overlaying a set of resources with additional information in the form of links to help people find other resources. However, existing hypermedia approaches primarily develop mechanisms to enable resource sharing in a fairly static, centralized way. Recent developments in distributed computing, on the other hand, introduced peer-to-peer (P2P) computing that is notable for employing distributed resources to perform a critical function in a more dynamic and ad-hoc scenario. We investigate the feasibility and potential benefits of …


A Content-Driven Reputation System For The Wikipedia, B. Thomas Adler, Luca De Alfaro Apr 2007

A Content-Driven Reputation System For The Wikipedia, B. Thomas Adler, Luca De Alfaro

Luca de Alfaro

We present a content-driven reputation system for Wikipedia authors. In our system, authors gain reputation when the edits they perform to Wikipedia articles are preserved by subsequent authors, and they lose reputation when their edits are rolled back or undone in short order. Thus, author reputation is computed solely on the basis of content evolution; user-to-user comments or ratings are not used. The author reputation we compute could be used to flag new contributions from low-reputation authors, or it could be used to allow only authors with high reputation to contribute to controversial or critical pages. A reputation system for …


Fast Global Kernel Density Mode Seeking: Applications To Localization And Tracking, Chunhua Shen, Michael Brooks, Anton Van Den Hengel Apr 2007

Fast Global Kernel Density Mode Seeking: Applications To Localization And Tracking, Chunhua Shen, Michael Brooks, Anton Van Den Hengel

Chunhua Shen

Tracking objects in video using the mean shift (MS) technique has been the subject of considerable attention. In this work, we aim to remedy one of its shortcomings. MS, like other gradient ascent optimization methods, is designed to find local modes. In many situations, however, we seek the global mode of a density function. The standard MS tracker assumes that the initialization point falls within the basin of attraction of the desired mode. When tracking objects in video this assumption may not hold, particularly when the target's displacement between successive frames is large. In this case, the local and global …


Designing Resource-Bounded Reasoners Using Bayesian Networks: System Health Monitoring And Diagnosis, Ole J. Mengshoel Apr 2007

Designing Resource-Bounded Reasoners Using Bayesian Networks: System Health Monitoring And Diagnosis, Ole J. Mengshoel

Ole J Mengshoel

In this work we are concerned with the conceptual design of large-scale diagnostic and health management systems that use Bayesian networks. While they are potentially powerful, improperly designed Bayesian networks can result in too high memory requirements or too long inference times, to they point where they may not be acceptable for real-time diagnosis and health management in resource-bounded systems such as NASA’s aerospace vehicles. We investigate the clique tree clustering approach to Bayesian network inference, where increasing the size and connectivity of a Bayesian network typically also increases clique tree size. This paper combines techniques for analytically characterizing clique …


Strategies For Research About Design: A Multidisciplinary Graduate Workshop, Mary Shaw, Susan Finger, Mark Gross, James Herbsleb Mar 2007

Strategies For Research About Design: A Multidisciplinary Graduate Workshop, Mary Shaw, Susan Finger, Mark Gross, James Herbsleb

Mary Shaw

We are developing a graduate curriculum and summer workshop on design research intended to prepare graduate students to do research about the nature of design or research about a class of designs, including concepts, models, and methods for that class. We expect our workshop to advance the science of design of softwareintensive systems by creating a open community of design researchers, both in software design and in related disciplines, who are knowledgeable about design and design research methods and who are interested in advancing the field. The curriculum will create a common basis for discussion and identify core material to …


Total Curriculum Management: A Lifecycle Approach, K. Michael Mar 2007

Total Curriculum Management: A Lifecycle Approach, K. Michael

Professor Katina Michael

No abstract provided.


Is Rfid Safe And Secure?, E. Latham, K. Michael Feb 2007

Is Rfid Safe And Secure?, E. Latham, K. Michael

Professor Katina Michael

No abstract provided.


A Case Study Of E-Services Oriented Architecture Transition During Development, Jia Zhang, Jen-Yao Chung Dec 2006

A Case Study Of E-Services Oriented Architecture Transition During Development, Jia Zhang, Jen-Yao Chung

Jia Zhang

No abstract provided.


Volitional Control Of Attention And Brain Activation In Dual Task Performance, Sharlene Newman, Timothy Keller, Marcel Just Dec 2006

Volitional Control Of Attention And Brain Activation In Dual Task Performance, Sharlene Newman, Timothy Keller, Marcel Just

Marcel Adam Just

No abstract provided.


Inhibitory Control In High Functioning Autism: Decreased Activation And Underconnectivity In Inhibition Networks, Rajesh Kana, Timothy Keller, Nancy Minshew, Marcel Just Dec 2006

Inhibitory Control In High Functioning Autism: Decreased Activation And Underconnectivity In Inhibition Networks, Rajesh Kana, Timothy Keller, Nancy Minshew, Marcel Just

Marcel Adam Just

No abstract provided.