Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 107

Full-Text Articles in Physical Sciences and Mathematics

Ssrn As An Initial Revolution In Academic Knowledge Aggregation And Dissemination, David Bray, Sascha Vitzthum, Benn Konsynski Jan 2010

Ssrn As An Initial Revolution In Academic Knowledge Aggregation And Dissemination, David Bray, Sascha Vitzthum, Benn Konsynski

Sascha Vitzthum

Within this paper we consider our results of using the Social Science Research Network (SSRN) over a period of 18 months to distribute our working papers to the research community. Our experiences have been quite positive, with SSRN serving as a platform both to inform our colleagues about our research as well as inform us about related research (through email and telephoned conversations of colleagues who discovered our paper on SSRN). We then discuss potential future directions for SSRN to consider, and how SSRN might well represent an initial revolution in 21st century academic knowledge aggregation and dissemination. Our paper …


A Mobile Agent-Supported Web Services Testing Platform, Jia Zhang, Di Xu Nov 2008

A Mobile Agent-Supported Web Services Testing Platform, Jia Zhang, Di Xu

Jia Zhang

No abstract provided.


Towards Self-Organizing, Smart Business Networks: Let’S Create ‘Life’ From Inert Information, David Bray, Benn Konsynski Nov 2008

Towards Self-Organizing, Smart Business Networks: Let’S Create ‘Life’ From Inert Information, David Bray, Benn Konsynski

David A. Bray

We review three different theories that can inform how researchers can determine the performance of smart business networks, to include: (1) the Theory of Evolution, (2) the Knowledge-Based Theory of the Firm, and (3) research insights into computers and cognition. We suggest that each of these theories demonstrate that to be generally perceived as smart, an organism needs to be self-organizing, communicative, and tool-making. Consequentially, to determine the performance of a smart business network, we suggest that researchers need to determine the degree to which it is self-organizing, communicative, and tool-making. We then relate these findings to the Internet and …


Spatio-Temporal Efficiency In A Taxi Dispatch System, Darshan Santani, Rajesh Krishna Balan, C. Jason Woodard Sep 2008

Spatio-Temporal Efficiency In A Taxi Dispatch System, Darshan Santani, Rajesh Krishna Balan, C. Jason Woodard

C. Jason Woodard

In this paper, we present an empirical analysis of the GPS-enabled taxi dispatch system used by the world’s second largest land transportation company. We first summarize the collective dynamics of the more than 6,000 taxicabs in this fleet. Next, we propose a simple method for evaluating the efficiency of the system over a given period of time and geographic zone. Our method yields valuable insights into system performance—in particular, revealing significant inefficiencies that should command the attention of the fleet operator. For example, despite the state of the art dispatching system employed by the company, we find imbalances in supply …


Model-Driven Performance Analysis, Gabriel A. Moreno, Paulo Merson Sep 2008

Model-Driven Performance Analysis, Gabriel A. Moreno, Paulo Merson

Gabriel A. Moreno

Model-Driven Engineering (MDE) is an approach to develop software systems by creating models and applying automated transformations to them to ultimately generate the implementation for a target platform. Although the main focus of MDE is on the generation of code, it is also necessary to support the analysis of the designs with respect to quality attributes such as performance. To complement the model-to-implementation path of MDE approaches, an MDE tool infrastructure should provide what we call model-driven analysis. This paper describes an approach to model-driven analysis based on reasoning frameworks. In particular, it describes a performance reasoning framework that can …


Transcriptional Responses To Estrogen And Progesterone In Mammary Gland Identify Networks Regulating P53 Activity, Shaolei Lu, Klaus A. Becker, Mary J. Hagen, Haoheng Yan, Amy L. Roberts, Lesley A. Mathews, Sallie S. Schneider, Hava Siegelmann, Kyle J. Macbeth, Stephen M. Tirrell, Jeffrey L. Blanchard, D. Joseph Jerry Sep 2008

Transcriptional Responses To Estrogen And Progesterone In Mammary Gland Identify Networks Regulating P53 Activity, Shaolei Lu, Klaus A. Becker, Mary J. Hagen, Haoheng Yan, Amy L. Roberts, Lesley A. Mathews, Sallie S. Schneider, Hava Siegelmann, Kyle J. Macbeth, Stephen M. Tirrell, Jeffrey L. Blanchard, D. Joseph Jerry

Hava Siegelmann

Estrogen and progestins are essential for mammary growth and differentiation but also enhance the activity of the p53 tumor suppressor protein in the mammary epithelium. However, the pathways by which these hormones regulate p53 activity are unknown. Microarrays were used to profile the transcriptional changes within the mammary gland after administration of either vehicle, 17β-estradiol (E), or progesterone (P) individually and combined (EP). Treatment with EP yielded 1182 unique genes that were differentially expressed compared to the vehicle-treated group. Although 30% of genes were responsive to either E or P individually, combined treatment with both EP had a synergistic effect …


Word Sense Disambiguation In Biomedical Ontologies With Term Co-Occurrence Analysis And Document Clustering, Bill Andreopoulos, Dimitra Alexopoulou, Michael Schroeder Sep 2008

Word Sense Disambiguation In Biomedical Ontologies With Term Co-Occurrence Analysis And Document Clustering, Bill Andreopoulos, Dimitra Alexopoulou, Michael Schroeder

William B. Andreopoulos

With more and more genomes being sequenced, a lot of effort is devoted to their annotation with terms from controlled vocabularies such as the GeneOntology. Manual annotation based on relevant literature is tedious, but automation of this process is difficult. One particularly challenging problem is word sense disambiguation. Terms such as |development| can refer to developmental biology or to the more general sense. Here, we present two approaches to address this problem by using term co-occurrences and document clustering. To evaluate our method we defined a corpus of 331 documents on development and developmental biology. Term co-occurrence analysis achieves an …


A Context-Driven Content Adaptation Planner For Improving Mobile Internet Accessibility, Stephen Yang, Jia Zhang, Angus Huang, Jeffrey Tsai, Philip Yu Aug 2008

A Context-Driven Content Adaptation Planner For Improving Mobile Internet Accessibility, Stephen Yang, Jia Zhang, Angus Huang, Jeffrey Tsai, Philip Yu

Jia Zhang

This paper presents our design and development of a context-driven content adaptation planner, which dynamically transforms requested Web content into a proper format conforming to receiving contexts (e.g., access condition, network connection, and receiving device). Aiming to establish a semantic foundation for content adaptation, we apply description logics (DLs) to formally define context profiles and requirements and automate content adaptation decision. In addition, the computational overhead caused by content adaptation can be moderately decreased through the reduction of the size of adapted content


Design And Development Of A University-Oriented Personalizable Web 2.0 Mashup Portal, Jia Zhang, Momtazul Karim, Karthik Akula, Raghu Ariga Aug 2008

Design And Development Of A University-Oriented Personalizable Web 2.0 Mashup Portal, Jia Zhang, Momtazul Karim, Karthik Akula, Raghu Ariga

Jia Zhang

This paper reports several key challenges and solutions when we apply Web 2.0 mashup technology to build a university-oriented services portal. A two-layer mashup service model is proposed as the underlying basis to support multiple granularities of services mashup. We explore a caching technique to facilitate personalizable services requests. We also report our preliminary practice of exploiting Facebook as a social relationship data source


A Heuristic Scheduling Scheme In Multiuser Ofdma Networks, Zheng Sun, Zhiqiang He, Ruochen Wang, Kai Niu Aug 2008

A Heuristic Scheduling Scheme In Multiuser Ofdma Networks, Zheng Sun, Zhiqiang He, Ruochen Wang, Kai Niu

Zheng Sun

Conventional heterogeneous-traffic scheduling schemes utilize zero-delay constraint for real-time services, which aims to minimize the average packet delay among real-time users. However, in light or moderate load networks this strategy is unnecessary and leads to low data throughput for non-real-time users. In this paper, we propose a heuristic scheduling scheme to solve this problem. The scheme measures and assigns scheduling priorities to both real-time and non-real-time users, and schedules the radio resources for the two user classes simultaneously. Simulation results show that the proposed scheme efficiently handles the heterogeneous-traffic scheduling with diverse QoS requirements and alleviates the unfairness between real-time …


Using Bayesian Networks For Candidate Generation In Consistency-Based Diagnosis, Sriram Narasimhan, Ole J. Mengshoel Aug 2008

Using Bayesian Networks For Candidate Generation In Consistency-Based Diagnosis, Sriram Narasimhan, Ole J. Mengshoel

Ole J Mengshoel

Consistency-based diagnosis relies on the computation of discrepancies between model predictions and sensor observations. The traditional assumption that these discrepancies can be detected accurately (by means of thresholding for example) is in many cases reasonable and leads to strong performance. However, in situations of substantial uncertainty (due, for example, to sensor noise or model abstraction), more robust schemes need to be designed to make a binary decision on whether predictions are consistent with observations or not. However, if an accurate binary decision is not made, there are risks of occurrence of false alarms and missed alarms. Moreover when multiple sensors …


Australia And The New Technologies: Towards Evidence Based Policy In Public Administration, K. Michael, M. G. Michael Jul 2008

Australia And The New Technologies: Towards Evidence Based Policy In Public Administration, K. Michael, M. G. Michael

Professor Katina Michael

This workshop addresses the application of evidence based policy in public administration. It specifically focuses on the issue of new technologies in the form of product and process innovations rolled out in Australia since major international events (e.g. Sept 11, Boxing Day Tsunami, Avian Flu outbreak). These product and process innovations introduced for the ‘common good’ are usually mandated by government agencies, designed and implemented by private business, and obligatorily adopted by citizens in the name of national security. The workshop investigates how information is gathered, processed and disseminated to provide evidence toward policy making. What qualitative and quantitative methods …


Überveillance: 24/7 X 365 People Tracking & Monitoring, Mg. Michael, K. Michael Jul 2008

Überveillance: 24/7 X 365 People Tracking & Monitoring, Mg. Michael, K. Michael

M. G. Michael

No abstract provided.


Enhancing The Face Of Service-Oriented Capabilities, Kym J. Pohl, Jens G. Pohl Jul 2008

Enhancing The Face Of Service-Oriented Capabilities, Kym J. Pohl, Jens G. Pohl

Jens G. Pohl

With today’s focus toward discoverable web services, Service-Oriented Architectures (SOA) are becoming increasingly prevalent. To support an effective interaction between services and their clientele, the sophistication of the interface, or face, such services present is of critical importance. Without a rich, expressive nature, such services struggle to satisfy the industry promises of reuse, composability, and reduced inter-component dependencies. Especially relevant for domain-oriented applications, services must present sufficient levels of expression to allow for an effective exchange of relevant context. Further, such communication should be offered in an asynchronous manner to promote both work flow efficiency and limited coupling. This paper …


The Round Table Model: A Web-Oriented, Agent-Based Approach To Decision-Support Applications, Kym J. Pohl, Jens G. Pohl Jul 2008

The Round Table Model: A Web-Oriented, Agent-Based Approach To Decision-Support Applications, Kym J. Pohl, Jens G. Pohl

Jens G. Pohl

Not unlike King Arthur relying on the infamous Round Table as the setting for consultation with his most trusted experts, agent-based, decision-support systems provide human decision makers with a means of solving complex problems through collaboration with collections of both human and computer-based expert agents. The Round Table Framework provides a formalized architecture together with a set of development and execution tools which can be utilized to design, develop, and execute agent-based, decision-support applications. Based on a three-tier architecture, Round Table incorporates forefront technologies including distributed-object servers, inference engines, and web-based presentation to provide a framework for collaborative, agent-based decision …


Data, Information, And Knowledge In The Context Of Sils, Michael A. Zang, Jens G. Pohl Jul 2008

Data, Information, And Knowledge In The Context Of Sils, Michael A. Zang, Jens G. Pohl

Jens G. Pohl

Data, information, and knowledge are becoming increasingly common terms in the literature of the software industry. This terminology originated some time ago in the disciplines of cognitive science and artificial intelligence to reference three closely related but distinct concepts. Traditionally, mainstream software engineering has lumped all three concepts together as data and has only recently begun to distinguish between them. Unfortunately, the popular desire to distinguish between data, information, and knowledge within the mainstream has blurred the individual meanings of the words to the point where there is no longer a clear-cut distinction between them for most people. This problem …


The Value Of Ontology-Based, Service-Oriented, Distributed Systems In A High Bandwidth Environment, Steven J. Gollery, Jens G. Pohl Jul 2008

The Value Of Ontology-Based, Service-Oriented, Distributed Systems In A High Bandwidth Environment, Steven J. Gollery, Jens G. Pohl

Jens G. Pohl

No abstract provided.


Unraveling Protein Networks With Power Graph Analysis, Loïc Royer, Matthias Reimann, Bill Andreopoulos, Michael Schroeder Jul 2008

Unraveling Protein Networks With Power Graph Analysis, Loïc Royer, Matthias Reimann, Bill Andreopoulos, Michael Schroeder

William B. Andreopoulos

Networks play a crucial role in computational biology, yet their analysis and representation is still an open problem. Power Graph Analysis is a lossless transformation of biological networks into a compact, less redundant representation, exploiting the abundance of cliques and bicliques as elementary topological motifs. We demonstrate with five examples the advantages of Power Graph Analysis. Investigating protein-protein interaction networks, we show how the catalytic subunits of the casein kinase II complex are distinguishable from the regulatory subunits, how interaction profiles and sequence phylogeny of SH3 domains correlate, and how false positive interactions among high-throughput interactions are spotted. Additionally, we …


Modeling Of Fermentation Processes Using Online Kernel Learning Algorithm, Yi Liu Jul 2008

Modeling Of Fermentation Processes Using Online Kernel Learning Algorithm, Yi Liu

Dr. Yi Liu

No abstract provided.


Adaptive Control Of A Class Of Nonlinear Discrete-Time Systems With Online Kernel Learning, Yi Liu Jul 2008

Adaptive Control Of A Class Of Nonlinear Discrete-Time Systems With Online Kernel Learning, Yi Liu

Dr. Yi Liu

No abstract provided.


Report Of The Commission To Assess The Threat To The United States From Emp Attack: Critical National Infrastructures, William R. Graham Jul 2008

Report Of The Commission To Assess The Threat To The United States From Emp Attack: Critical National Infrastructures, William R. Graham

George H Baker

The physical and social fabric of the United States is sustained by a system of systems; a complex and dynamic network of interlocking and interdependent infrastructures (“critical national infrastructures”) whose harmonious functioning enables the myriad actions, transactions, and information flow that undergird the orderly conduct of civil society in this country. The vulnerability of these frastructures to threats — deliberate, accidental, and acts of nature — is the focus of greatly heightened concern in the current era, a process accelerated by the events of 9/11 and recent hurricanes, including Katrina and Rita. This report presents the results of the Commission’s …


Autonomous Geometric Precision Error Estimation In Low-Level Computer Vision Tasks, Andrés Corrada-Emmanuel, Howard Schultz Jul 2008

Autonomous Geometric Precision Error Estimation In Low-Level Computer Vision Tasks, Andrés Corrada-Emmanuel, Howard Schultz

Andrés Corrada-Emmanuel

Errors in map-making tasks using computer vision are sparse. We demonstrate this by considering the construction of digital elevation models that employ stereo matching algorithms to triangulate real-world points. This sparsity, coupled with a geometric theory of errors recently developed by the authors, allows for autonomous agents to calculate their own precision independently of ground truth. We connect these developments with recent advances in the mathematics of sparse signal reconstruction or compressed sensing. The theory presented here extends the autonomy of 3-D model reconstructions discovered in the 1990s to their errors.


Iniu – A Services Portal For Niu Students, Raghu Ariga, Karthik Akula, Shreya Gujjala, Momtazul Karim, Shishira Ramesh, Jia Zhang Jun 2008

Iniu – A Services Portal For Niu Students, Raghu Ariga, Karthik Akula, Shreya Gujjala, Momtazul Karim, Shishira Ramesh, Jia Zhang

Jia Zhang

No abstract provided.


An Automatic Semantic Segment Detection Service For Html Documents, Stephen Yang, Jia Zhang, Stella Tsai Jun 2008

An Automatic Semantic Segment Detection Service For Html Documents, Stephen Yang, Jia Zhang, Stella Tsai

Jia Zhang

No abstract provided.


A Method And Case Study Of Designing Presentation Module In An Soa-Based Solution Using Configurable Architectural Building Blocks (Abbs), Liang-Jie Zhang, Jia Zhang, Abdul Allam Jun 2008

A Method And Case Study Of Designing Presentation Module In An Soa-Based Solution Using Configurable Architectural Building Blocks (Abbs), Liang-Jie Zhang, Jia Zhang, Abdul Allam

Jia Zhang

Service-Oriented Architecture (SOA) projects typically pose challenging requirements on software developers such as flexibility, speed to market, and adaptability to ever changing business requirements. In this paper, we propose a novel method of rapidly designing presentation module for an SOA-based solution using fine-grained configurable architectural building blocks (ABBs). An ABB-based presentation pattern derived from industry best practices is presented, associated with a tailored ABB configuration framework. We also introduce a formal way of modeling ABBs and their interactions. Real-life experiences of applying our ABB-based model are condensed into sixteen architectural decision points, which are further applied into a variety of …


Predicting The Behavior Of A Highly Configurable Component Based Real-Time System, Gabriel A. Moreno, Scott A. Hissam, Daniel Plakosh, Isak Savo, Marcin Stelmarczyk Jun 2008

Predicting The Behavior Of A Highly Configurable Component Based Real-Time System, Gabriel A. Moreno, Scott A. Hissam, Daniel Plakosh, Isak Savo, Marcin Stelmarczyk

Gabriel A. Moreno

Software components and the technology supporting component based software engineering contribute greatly to the rapid development and configuration of systems for a variety of application domains. Such domains go beyond desktop office applications and information systems supporting e-commerce, but include systems having real-time performance requirements and critical functionality. Discussed in this paper are the results from an experiment that demonstrates the ability to predict deadline satisfaction of threads in a real-time system where the functionality performed is based on the configuration of the assembled software components. Presented is the method used to abstract the large, legacy code base of the …


A Game Theory Approach For An Emergency Management Security Advisory System, Cheng-Kuang Wu Jun 2008

A Game Theory Approach For An Emergency Management Security Advisory System, Cheng-Kuang Wu

Cheng-Kuang Wu

Efficient emergency management must determine how and when to alert and advise the critical and appropriate response units to the danger of terrorist attacks, particularly when available resources are limited. We propose a framework for homeland security advisory system that incorporates two game theory models designed to advise response units and raise the alarm. In the first scheme the interactive behaviors between the elements or participants of the multi-emergency response system and the zone response unit are modeled and analyzed as a non-cooperative game, after which the terrorist threat value is derived from the mixed strategy Nash equilibrium. In the …


Verifying Semantic Business Process Models In Inter-Operation, George Koliadis, Aditya Ghose Jun 2008

Verifying Semantic Business Process Models In Inter-Operation, George Koliadis, Aditya Ghose

Professor Aditya K. Ghose

Process inter-operation is characterized as cooperative interactions among loosely coupled autonomous constituents to adaptively fulfill system-wide purpose. Issues of inconsistency can be anticipated in inter-operating processes given their independent management and design. To reduce inconsistency (that may contribute to failures) effective methods for statically verifying behavioral interoperability are required. This paper contributes a method for practical, semantic verification of interoperating processes (as represented with BPMN models). We provide methods to evaluate consistency during process design where annotation of the immediate effect of tasks and sub-processes has been provided. Furthermore, some guidelines are defined against common models of inter-operation for scoping …


Performance Analysis Of Real-Time Component Architectures: A Model Interchange Approach, Gabriel A. Moreno, Connie U. Smith, Lloyd G. Williams May 2008

Performance Analysis Of Real-Time Component Architectures: A Model Interchange Approach, Gabriel A. Moreno, Connie U. Smith, Lloyd G. Williams

Gabriel A. Moreno

Model interchange approaches support the analysis of software architecture and design by enabling a variety of tools to automatically exchange performance models using a common schema. This paper builds on one of those interchange formats, the Software Performance Model Interchange Format (S-PMIF), and extends it to support the performance analysis of real-time systems. Specifically, it addresses real-time system designs expressed in the Construction and Composition Language (CCL) and their transformation into the S-PMIF for additional performance analyses. This paper defines extensions and changes to the S-PMIF meta-model and schema required for real-time systems. It describes transformations for both simple, best-case …


Distinguishing Between Software Oriented Architecture And Software As A Service: What's In A Name?, Phillip A. Laplante, Jia Zhang, Jeffrey Voas May 2008

Distinguishing Between Software Oriented Architecture And Software As A Service: What's In A Name?, Phillip A. Laplante, Jia Zhang, Jeffrey Voas

Jia Zhang

No abstract provided.