Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 23 of 23

Full-Text Articles in Physical Sciences and Mathematics

“I Read My Twitter The Next Morning And Was Astonished” A Conversational Perspective On Twitter Regrets, Manya Sleeper, Justin Cranshaw, Patrick Kelley, Blase Ur, Alessandro Acquisti, Lorrie Cranor, Norman Sadeh Dec 2015

“I Read My Twitter The Next Morning And Was Astonished” A Conversational Perspective On Twitter Regrets, Manya Sleeper, Justin Cranshaw, Patrick Kelley, Blase Ur, Alessandro Acquisti, Lorrie Cranor, Norman Sadeh

Lorrie F Cranor

We present the results of an online survey of 1,221 Twitter users, comparing messages individuals regretted either saying during in-person conversations or posting on Twitter. Participants generally reported similar types of regrets in person and on Twitter. In particular, they often regretted messages that were critical of others. However, regretted messages that were cathartic/expressive or revealed too much information were reported at a higher rate for Twitter. Regretted messages on Twitter also reached broader audiences. In addition, we found that participants who posted on Twitter became aware of, and tried to repair, regret more slowly than those reporting in-person regrets. …


Production Planning And Control Systems-State Of The Art And New Directions, V. Sridharan, John Kanet Sep 2015

Production Planning And Control Systems-State Of The Art And New Directions, V. Sridharan, John Kanet

John J. Kanet

This chapter begins with a description of the role of production planning and control (PPC) within the manufacturing function. After discussing the impact of the operating environment on the choice a system for PPC, we describe some recent empirical evidence regarding the use and performance results of various PPC systems. This is followed by a brief overview of the two most widely used systems for production planning and control. We then describe a recent development in the area of short-term detailed scheduling exploiting the latest developments in computing technology. The chapter concludes with a discussion of an emerging paradigm for …


Operations Research For Freight Train Routing And Scheduling, Steven Harrod, Michael Gorman Sep 2015

Operations Research For Freight Train Routing And Scheduling, Steven Harrod, Michael Gorman

Michael F. Gorman

This article describes the service design activities that plan and implement the rail freight operating plan. Elements of strategic service design include the setting of train frequency, the routing of cars among trains, and the consolidation of cars, called blocking. At the operational level, trains are dispatched either according to train paths configured in advance, called timetables, or according to priority rules. We describe the North American and European practice along with selected modeling and problem solving methodologies appropriate for each of the operating conditions described.


Operations Research Approaches In Asset Management In Freight Rail, Michael Gorman, Steven Harrod Sep 2015

Operations Research Approaches In Asset Management In Freight Rail, Michael Gorman, Steven Harrod

Michael F. Gorman

This article describes operations research methodologies as they apply to asset management in freight rail. We describe state-of-the-art methods for locomotive, crew, rail-car, line and yard planning and management. We conclude with emerging areas of research in rail.


Welcome To The Machine: Privacy And Workplace Implications Of Predictive Analytics, Robert Sprague Apr 2015

Welcome To The Machine: Privacy And Workplace Implications Of Predictive Analytics, Robert Sprague

Robert Sprague

Predictive analytics use a method known as data mining to identify trends, patterns, or relationships among data, which can then be used to develop a predictive model. Data mining itself relies upon big data, which is “big” not solely because of its size but also because its analytical potential is qualitatively different. “Big data” analysis allows organizations, including government and businesses, to combine diverse digital datasets and then use statistics and other data mining techniques to extract from them both hidden information and surprising correlations. These data are not necessarily tracking transactional records of atomized behavior, such as the purchasing …


Theory Identity: A Machine-Learning Approach, Kai Larsen, Dirk Hovorka, Jevin West, James Birt, James Pfaff, Trevor Chambers, Zebula Sampedro, Nick Zager, Bruce Vanstone Mar 2015

Theory Identity: A Machine-Learning Approach, Kai Larsen, Dirk Hovorka, Jevin West, James Birt, James Pfaff, Trevor Chambers, Zebula Sampedro, Nick Zager, Bruce Vanstone

Bruce Vanstone

Theory identity is a fundamental problem for researchers seeking to determine theory quality, create theory ontologies and taxonomies, or perform focused theory-specific reviews and meta-analyses. We demonstrate a novel machine-learning approach to theory identification based on citation data and article features. The multi-disciplinary ecosystem of articles which cite a theory's originating paper is created and refined into the network of papers predicted to contribute to, and thus identify, a specific theory. We provide a 'proof-of-concept' for a highly-cited theory. Implications for crossdisciplinary theory integration and the identification of theories for a rapidly expanding scientific literature are discussed.


Information Technology, Ying Chen Dec 2014

Information Technology, Ying Chen

Ying Chen

This research guide includes lists and links for recommended databases, journals, and web resources on Information Technology. It also provides helpful information for citation and writing with emphasis on the science disciplines.


Exploring The Dimensions Of Nomophobia: Developing And Validating A Questionnaire Using Mixed Methods Research, Caglar Yildirim Oct 2014

Exploring The Dimensions Of Nomophobia: Developing And Validating A Questionnaire Using Mixed Methods Research, Caglar Yildirim

Caglar Yildirim

Nomophobia is defined as the fear of being out of mobile phone contact and is considered a modern age phobia introduced to our lives as a byproduct of the interaction between people and mobile information and communication technologies, especially smartphones. This research study sought to contribute to the nomophobia research literature by identifying and describing the dimensions of nomophobia and developing a questionnaire to measure nomophobia. Consequently, this study adopted a two-phase, exploratory sequential mixed methods design. The first phase was a qualitative exploration of nomophobia through semi-structured interviews conducted with nine undergraduate students at a large Midwestern university in …


Knowledge Management In An Organisational Climate Of Uncertainty And Change: A Longitudinal Case Study Of An Australian University, Denise Gengatharen Apr 2014

Knowledge Management In An Organisational Climate Of Uncertainty And Change: A Longitudinal Case Study Of An Australian University, Denise Gengatharen

Denise E Gengatharen

Universities are in the knowledge business and are expected to be at the forefront of knowledge management (KM). However, KM in a university is complex given the diversity of stakeholder groups. This is exacerbated in the Australian context by the changing climate of rationalisation, corporatisation and marketisation universities faced in the past decade. This paper investigates KM strategies in an Australian university to uncover barriers to knowledge-sharing among academics. Although the organisational infrastructure supports KM, many academics have not actively embraced it. One reason is that they struggle with KM for operational excellence in the increasing administrative aspects of the …


Social Sensing For Urban Crisis Management: The Case Of Singapore Haze, Philips Kokoh Prasetyo, Ming Gao, Ee Peng Lim, Christie N. Scollon Mar 2014

Social Sensing For Urban Crisis Management: The Case Of Singapore Haze, Philips Kokoh Prasetyo, Ming Gao, Ee Peng Lim, Christie N. Scollon

Ming Gao

Sensing social media for trends and events has become possible as increasing number of users rely on social media to share information. In the event of a major disaster or social event, one can therefore study the event quickly by gathering and analyzing social media data. One can also design appropriate responses such as allocating resources to the affected areas, sharing event related information, and managing public anxiety. Past research on social event studies using social media often focused on one type of data analysis (e.g., hashtag clusters, diffusion of events, influential users, etc.) on a single social media data …


Knowledge As A Service Framework For Disaster Data Management, Katarina Grolinger, Emna Mezghani, Miriam Capretz, Ernesto Exposito Jan 2014

Knowledge As A Service Framework For Disaster Data Management, Katarina Grolinger, Emna Mezghani, Miriam Capretz, Ernesto Exposito

Katarina Grolinger

Each year, a number of natural disasters strike across the globe, killing hundreds and causing billions of dollars in property and infrastructure damage. Minimizing the impact of disasters is imperative in today’s society. As the capabilities of software and hardware evolve, so does the role of information and communication technology in disaster mitigation, preparation, response, and recovery. A large quantity of disaster-related data is available, including response plans, records of previous incidents, simulation data, social media data, and Web sites. However, current data management solutions offer few or no integration capabilities. Moreover, recent advances in cloud computing, big data, and …


Modeling The Longitudinality Of User Acceptance Of Technology With An Evidence-Adaptive Clinical Decision Support System, Michael P. Johnson Jr., Kai Zheng, Rema Padman Dec 2013

Modeling The Longitudinality Of User Acceptance Of Technology With An Evidence-Adaptive Clinical Decision Support System, Michael P. Johnson Jr., Kai Zheng, Rema Padman

Michael P. Johnson

This paper presents multiple innovations associated with an electronic health record system developed to support evidence-based medicine practice, and highlights a new construct, based on the technology acceptance model, to explain end users' acceptance of this technology through a lens of continuous behavioral adaptation and change. We show that this new conceptualization of technology acceptance reveals a richer level of detail of the developmental course whereby individuals adjust their behavior gradually to assimilate technology use. We also show that traditional models such as technology acceptance model (TAM) are not capable of delineating this longitudinal behavioral development process. Our TAM-derived analysis …


Query-Oriented Keyphrase Extraction, Minghui Qiu, Yaliang Li, Jing Jiang Sep 2013

Query-Oriented Keyphrase Extraction, Minghui Qiu, Yaliang Li, Jing Jiang

Minghui QIU

People often issue informational queries to search engines to find out more about some entities or events. While a Wikipedia-like summary would be an ideal answer to such queries, not all queries have a corresponding Wikipedia entry. In this work we propose to study query-oriented keyphrase extraction, which can be used to assist search results summarization. We propose a general method for keyphrase extraction for our task, where we consider both phraseness and informativeness. We discuss three criteria for phraseness and four ways to compute informativeness scores. Using a large Wikipedia corpus and 40 queries, our empirical evaluation shows that …


Touch: In-Memory Spatial Join By Hierarchical Data-Oriented Partitioning, Sadegh Nobari, Farhan Tauheed, Thomas Heinis, Panagiotis Karras, Stéphane Bressan, Anastasia Ailamaki Jun 2013

Touch: In-Memory Spatial Join By Hierarchical Data-Oriented Partitioning, Sadegh Nobari, Farhan Tauheed, Thomas Heinis, Panagiotis Karras, Stéphane Bressan, Anastasia Ailamaki

Sadegh Nobari

Efficient spatial joins are pivotal for many applications and particularly important for geographical information systems or for the simulation sciences where scientists work with spatial models. Past research has primarily focused on disk-based spatial joins; efficient in- memory approaches, however, are important for two reasons: a) main memory has grown so large that many datasets fit in it and b) the in-memory join is a very time-consuming part of all disk-based spatial joins.


Automated Extraction Of Community Mobility Measures From Gps Stream Data Using Temporal Dbscan, Sungsoon Hwang, Timothy Hanke, Christian Evans May 2013

Automated Extraction Of Community Mobility Measures From Gps Stream Data Using Temporal Dbscan, Sungsoon Hwang, Timothy Hanke, Christian Evans

Sungsoon Hwang

Inferring community mobility of patients from GPS data has received much attention in health research. Developing robust mobility (or physical activity) monitoring systems relies on the automated algorithm that classifies GPS track points into events (such as stops where activities are conducted, and routes taken) accurately. This paper describes the method that automatically extracts community mobility measures from GPS track data. The method uses temporal DBSCAN in classifying track points, and temporal filtering in removing noises (any misclassified track points). The result shows that the proposed method classifies track points with 88% accuracy. The percent of misclassified track points decreased …


Human Resource Information Systems: Information Security Concerns For Organizations, Humayun Zafar Jan 2013

Human Resource Information Systems: Information Security Concerns For Organizations, Humayun Zafar

Humayun Zafar

We explore HRIS and e-HR security by presenting information security fundamentals and how they pertain to organizations. With increasing use of enterprise systems such as HRIS and e-HR, security of such systems is an area that is worthy of further exploration. Even then, there is surprisingly little research in this area, albeit that extensive work is present in regard to HRIS privacy. While focusing on HRIS and e-HR security, we introduce aspects of HRIS and e-HR security and how it can be enhanced in organizations. A research model is also presented along with propositions that can guide future research.


Its Training Update, Veronica Trammell Dec 2011

Its Training Update, Veronica Trammell

Veronica O. Trammell

No abstract provided.


Matching Dependence-Related Queries In The System Dependence Graph., Xiaoyin Wang, David Lo, Jiefeng Cheng, Lu Zhang, Hong Mei, Jeffrey Xu Yu Nov 2011

Matching Dependence-Related Queries In The System Dependence Graph., Xiaoyin Wang, David Lo, Jiefeng Cheng, Lu Zhang, Hong Mei, Jeffrey Xu Yu

David LO

In software maintenance and evolution, it is common that developers want to apply a change to a number of similar places. Due to the size and complexity of the code base, it is challenging for developers to locate all the places that need the change. A main challenge in locating the places that need the change is that, these places share certain common dependence conditions but existing code searching techniques can hardly handle dependence relations satisfactorily. In this paper, we propose a technique that enables developers to make queries involving dependence conditions and textual conditions on the system dependence graph …


Mining Iterative Generators And Representative Rules For Software Specification Discovery, David Lo, Jinyan Li, Limsoon Wong, Siau-Cheng Khoo Nov 2011

Mining Iterative Generators And Representative Rules For Software Specification Discovery, David Lo, Jinyan Li, Limsoon Wong, Siau-Cheng Khoo

David LO

Billions of dollars are spent annually on software-related cost. It is estimated that up to 45 percent of software cost is due to the difficulty in understanding existing systems when performing maintenance tasks (i.e., adding features, removing bugs, etc.). One of the root causes is that software products often come with poor, incomplete, or even without any documented specifications. In an effort to improve program understanding, Lo et al. have proposed iterative pattern mining which outputs patterns that are repeated frequently within a program trace, or across multiple traces, or both. Frequent iterative patterns reflect frequent program behaviors that likely …


Mining Closed Discriminative Dyadic Sequential Patterns, David Lo, Hong Cheng, - Lucia Nov 2011

Mining Closed Discriminative Dyadic Sequential Patterns, David Lo, Hong Cheng, - Lucia

David LO

A lot of data are in sequential formats. In this study, we are interested in sequential data that goes in pairs. There are many interesting datasets in this format coming from various domains including parallel textual corpora, duplicate bug reports, and other pairs of related sequences of events. Our goal is to mine a set of closed discriminative dyadic sequential patterns from a database of sequence pairs each belonging to one of the two classes +ve and -ve. These dyadic sequential patterns characterize the discriminating facets contrasting the two classes. They are potentially good features to be used for the …


Panopto Is Now Available For Lecture Capture, Veronica Trammell Jul 2011

Panopto Is Now Available For Lecture Capture, Veronica Trammell

Veronica O. Trammell

The Distance Learning Center has purchased a new lecture delivery option for faculty who teach online. Panopto is a lecture capture application which allows faculty to capture their lectures using a simple webcam or a sophisticated video classroom.


Publishing Survey Articles On Information Retrieval Topics, Douglas Oard, Fabrizio Sebastiani, Jonathan Furner, Gary Marchionini May 2011

Publishing Survey Articles On Information Retrieval Topics, Douglas Oard, Fabrizio Sebastiani, Jonathan Furner, Gary Marchionini

Jonathan Furner

Survey articles are an important way of sharing knowledge among interested researchers and contributing to the growth of a field. This brief note identifies several outlets for survey articles on information retrieval, and identifies some reasons to write articles of this type.


Partially Materialized Digest Scheme: An Efficient Verification Method For Outsourced Databases, Kyriakos Mouratidis, Dimitris Sacharidis, Hwee Hwa Pang Dec 2010

Partially Materialized Digest Scheme: An Efficient Verification Method For Outsourced Databases, Kyriakos Mouratidis, Dimitris Sacharidis, Hwee Hwa Pang

Kyriakos MOURATIDIS

In the outsourced database model, a data owner publishes her database through a third-party server; i.e., the server hosts the data and answers user queries on behalf of the owner. Since the server may not be trusted, or may be compromised, users need a means to verify that answers received are both authentic and complete, i.e., that the returned data have not been tampered with, and that no qualifying results have been omitted. We propose a result verification approach for one-dimensional queries, called Partially Materialized Digest scheme (PMD), that applies to both static and dynamic databases. PMD uses separate indexes …