Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 27 of 27

Full-Text Articles in Physical Sciences and Mathematics

Rapport: Semantic-Sensitive Namespace Management In Large-Scale File Systems, Yu Hua, Hong Jiang, Yifeng Zhu, Dan Feng Sep 2013

Rapport: Semantic-Sensitive Namespace Management In Large-Scale File Systems, Yu Hua, Hong Jiang, Yifeng Zhu, Dan Feng

Yifeng Zhu

Explosive growth in volume and complexity of data exacerbates the key challenge to effectively and efficiently manage data in a way that fundamentally improves the ease and efficacy of their use. Existing large-scale file systems rely on hierarchically structured namespace that leads to severe performance bottlenecks and renders it impossible to support real-time queries on multi-dimensional attributes. This paper proposes a novel semantic-sensitive scheme, called Rapport, to provide dynamic and adaptive namespace management and support complex queries. The basic idea is to build files’ namespace by utilizing their semantic correlation and exploiting dynamic evolution of attributes to support namespace management. …


It Is Not Just What We Say, But How We Say Them: Lda-Based Behavior-Topic Model, Minghui Qiu, Feida Zhu, Jing Jiang Sep 2013

It Is Not Just What We Say, But How We Say Them: Lda-Based Behavior-Topic Model, Minghui Qiu, Feida Zhu, Jing Jiang

Minghui QIU

Textual information exchanged among users on online social network platforms provides deep understanding into users' interest and behavioral patterns. However, unlike traditional text-dominant settings such as o ine publishing, one distinct feature for online social network is users' rich interactions with the textual content, which, unfortunately, has not yet been well incorporated in the existing topic modeling frameworks. In this paper, we propose an LDA-based behavior-topic model (B-LDA) which jointly models user topic interests and behavioral patterns. We focus the study of the model on online social network settings such as microblogs like Twitter where the textual content is relatively …


Query-Oriented Keyphrase Extraction, Minghui Qiu, Yaliang Li, Jing Jiang Sep 2013

Query-Oriented Keyphrase Extraction, Minghui Qiu, Yaliang Li, Jing Jiang

Minghui QIU

People often issue informational queries to search engines to find out more about some entities or events. While a Wikipedia-like summary would be an ideal answer to such queries, not all queries have a corresponding Wikipedia entry. In this work we propose to study query-oriented keyphrase extraction, which can be used to assist search results summarization. We propose a general method for keyphrase extraction for our task, where we consider both phraseness and informativeness. We discuss three criteria for phraseness and four ways to compute informativeness scores. Using a large Wikipedia corpus and 40 queries, our empirical evaluation shows that …


Shortlisting Top-K Assignments, Yimin Lin, Kyriakos Mouratidis Aug 2013

Shortlisting Top-K Assignments, Yimin Lin, Kyriakos Mouratidis

Kyriakos MOURATIDIS

In this paper we identify a novel query type, the top-K assignment query (αTop-K). Consider a set of objects and a set of suppliers, where each object must be assigned to one supplier. Assume that there is a cost associated with every object-supplier pair. If we allocate each object to the server with the smallest cost (for the specific object), the derived overall assignment will have the minimum total cost. In many scenarios, however, runner-up assignments may be required too, like for example when a decision maker needs to make additional considerations, not captured by individual object-supplier costs. In this …


Best Upgrade Plans For Large Road Networks, Yimin Lin, Kyriakos Mouratidis Aug 2013

Best Upgrade Plans For Large Road Networks, Yimin Lin, Kyriakos Mouratidis

Kyriakos MOURATIDIS

In this paper, we consider a new problem in the context of road network databases, named Resource Constrained Best Upgrade Plan computation (BUP, for short). Consider a transportation network (weighted graph) G where a subset of the edges are upgradable, i.e., for each such edge there is a cost, which if spent, the weight of the edge can be reduced to a specific new value. Given a source and a destination in G, and a budget (resource constraint) B, the BUP problem is to identify which upgradable edges should be upgraded so that the shortest path distance between source and …


Making Sense Of Software Development And Personality Types, Luiz Fernando Capretz, Faheem Ahmed Dr. Jul 2013

Making Sense Of Software Development And Personality Types, Luiz Fernando Capretz, Faheem Ahmed Dr.

Luiz Fernando Capretz

No abstract provided.


How To Build An Rss Feed Using Asp, Umakant Mishra Jun 2013

How To Build An Rss Feed Using Asp, Umakant Mishra

Umakant Mishra

RSS is a XML based format. The Current popular version of RSS is RSS version 2.0. The purpose of adding an RSS feed to your site is to show if anything new is added to the site. For example, if a new article or blog or news item is added to your site that should automatically appear in the RSS feed so that the visitors/ RSS readers will automatically get updated about this new addition. The RSS feed is also called RSS channel.

There are two main elements of the RSS XML file, one is the header or channel element …


Touch: In-Memory Spatial Join By Hierarchical Data-Oriented Partitioning, Sadegh Nobari, Farhan Tauheed, Thomas Heinis, Panagiotis Karras, Stéphane Bressan, Anastasia Ailamaki Jun 2013

Touch: In-Memory Spatial Join By Hierarchical Data-Oriented Partitioning, Sadegh Nobari, Farhan Tauheed, Thomas Heinis, Panagiotis Karras, Stéphane Bressan, Anastasia Ailamaki

Sadegh Nobari

Efficient spatial joins are pivotal for many applications and particularly important for geographical information systems or for the simulation sciences where scientists work with spatial models. Past research has primarily focused on disk-based spatial joins; efficient in- memory approaches, however, are important for two reasons: a) main memory has grown so large that many datasets fit in it and b) the in-memory join is a very time-consuming part of all disk-based spatial joins.


Automated Extraction Of Community Mobility Measures From Gps Stream Data Using Temporal Dbscan, Sungsoon Hwang, Timothy Hanke, Christian Evans May 2013

Automated Extraction Of Community Mobility Measures From Gps Stream Data Using Temporal Dbscan, Sungsoon Hwang, Timothy Hanke, Christian Evans

Sungsoon Hwang

Inferring community mobility of patients from GPS data has received much attention in health research. Developing robust mobility (or physical activity) monitoring systems relies on the automated algorithm that classifies GPS track points into events (such as stops where activities are conducted, and routes taken) accurately. This paper describes the method that automatically extracts community mobility measures from GPS track data. The method uses temporal DBSCAN in classifying track points, and temporal filtering in removing noises (any misclassified track points). The result shows that the proposed method classifies track points with 88% accuracy. The percent of misclassified track points decreased …


F-Trail: Finding Patterns In Taxi Trajectories, Yasuko Matsubara, Evangelos Papalexakis, Lei Li, David Lo, Yasushi Sakurai, Christos Faloutsos Apr 2013

F-Trail: Finding Patterns In Taxi Trajectories, Yasuko Matsubara, Evangelos Papalexakis, Lei Li, David Lo, Yasushi Sakurai, Christos Faloutsos

David LO

Given a large number of taxi trajectories, we would like to find interesting and unexpected patterns from the data. How can we summarize the major trends, and how can we spot anomalies? The analysis of trajectories has been an issue of considerable interest with many applications such as tracking trails of migrating animals and predicting the path of hurricanes. Several recent works propose methods on clustering and indexing trajectories data. However, these approaches are not especially well suited to pattern discovery with respect to the dynamics of social and economic behavior. To further analyze a huge collection of taxi trajectories, …


Putting Artists On The Map: A Five Part Study Of Greater Cleveland Artists' Location Decisions - Part 3: Attitudinal Analysis - Artist Housing And Space Survey, Mark Salling, Gregory Soltis, Charles Post, Sharon Bliss, Ellen Cyran Mar 2013

Putting Artists On The Map: A Five Part Study Of Greater Cleveland Artists' Location Decisions - Part 3: Attitudinal Analysis - Artist Housing And Space Survey, Mark Salling, Gregory Soltis, Charles Post, Sharon Bliss, Ellen Cyran

Ellen Cyran

A series of reports detailing the residential and work space location preferences of Cuyahoga county's artists.


Putting Artists On The Map: A Five Part Study Of Greater Cleveland Artists' Location Decisions - Part 2: Profiles Of Artist Neighborhoods, Mark Salling, Gregory Soltis, Charles Post, Sharon Bliss, Ellen Cyran Mar 2013

Putting Artists On The Map: A Five Part Study Of Greater Cleveland Artists' Location Decisions - Part 2: Profiles Of Artist Neighborhoods, Mark Salling, Gregory Soltis, Charles Post, Sharon Bliss, Ellen Cyran

Ellen Cyran

A series of reports detailing the residential and work space location preferences of Cuyahoga county's artists.


Putting Artists On The Map: A Five Part Study Of Greater Cleveland Artists' Location Decisions - Part 1: Summary Report, Mark Salling, Gregory Soltis, Charles Post, Sharon Bliss, Ellen Cyran Mar 2013

Putting Artists On The Map: A Five Part Study Of Greater Cleveland Artists' Location Decisions - Part 1: Summary Report, Mark Salling, Gregory Soltis, Charles Post, Sharon Bliss, Ellen Cyran

Ellen Cyran

A series of reports detailing the residential and work space location preferences of Cuyahoga county's artists.


Census 2000 Demographic And Housing Profile Reports, Mark Salling, Ellen Cyran, Sharon Bliss Mar 2013

Census 2000 Demographic And Housing Profile Reports, Mark Salling, Ellen Cyran, Sharon Bliss

Ellen Cyran

No abstract provided.


Foreign-Born Population In Selected Ohio Cities, 1870 To 2000 A Brief Descriptive Report, Mark Salling, Ellen Cyran Mar 2013

Foreign-Born Population In Selected Ohio Cities, 1870 To 2000 A Brief Descriptive Report, Mark Salling, Ellen Cyran

Ellen Cyran

No abstract provided.


Putting Artists On The Map: A Five Part Study Of Greater Cleveland Artists' Location Decisions - Part 5: Properties Analysis - Artist Housing Characteristics, Mark Salling, Gregory Soltis, Charles Post, Sharon Bliss, Ellen Cyran Mar 2013

Putting Artists On The Map: A Five Part Study Of Greater Cleveland Artists' Location Decisions - Part 5: Properties Analysis - Artist Housing Characteristics, Mark Salling, Gregory Soltis, Charles Post, Sharon Bliss, Ellen Cyran

Ellen Cyran

A series of reports detailing the residential and work space location preferences of Cuyahoga county's artists.


Foreign Migration To The Cleveland-Akron-Lorain Metropolitan Area From 1995 To 2000, Mark Salling, Ellen Cyran Mar 2013

Foreign Migration To The Cleveland-Akron-Lorain Metropolitan Area From 1995 To 2000, Mark Salling, Ellen Cyran

Ellen Cyran

This report is one of a series on migration to and from the region using the five percent Public Use Microdata Sample (PUMS) of the 2000 Census of Population and Housing and provides a description of foreign migrants moving to the Cleveland-Akron-Lorain (CAL) Consolidated Metropolitan Area (CMSA) from 1995 to 2000.* The report identifies the countries of origin of migrants and compares the demographic, socioeconomic, and housing characteristics of the foreign migrants to the CAL with other groups, including foreign migrants to Ohio and the nation, and, at times, to domestic migrants to and from the CAL.


Putting Artists On The Map: A Five Part Study Of Greater Cleveland Artists' Location Decisions - Part 4: Predictive Analysis - Regression Modeling, Mark Salling, Gregory Soltis, Charles Post, Sharon Bliss, Ellen Cyran Mar 2013

Putting Artists On The Map: A Five Part Study Of Greater Cleveland Artists' Location Decisions - Part 4: Predictive Analysis - Regression Modeling, Mark Salling, Gregory Soltis, Charles Post, Sharon Bliss, Ellen Cyran

Ellen Cyran

A series of reports detailing the residential and work space location preferences of Cuyahoga county's artists.


Using The Census Bureau's Public Use Microdata For Migration Analysis, Mark Salling, Ellen Cyran Mar 2013

Using The Census Bureau's Public Use Microdata For Migration Analysis, Mark Salling, Ellen Cyran

Ellen Cyran

Using the Census Bureau's Public Use Microdata for Migration Analysis, Proceedings of the annual conference of the Urban and Regional Information Systems Association, Vancouver, BC, Canada, September 2006, pp.336-348.


From Cyber Terrorism To State Actors’ Covert Cyber Operations, Jan Kallberg, Bhavani Thuraisingham Mar 2013

From Cyber Terrorism To State Actors’ Covert Cyber Operations, Jan Kallberg, Bhavani Thuraisingham

Jan Kallberg

Historically, since the Internet started to become a common feature in our lives, hackers have been seen as a major threat. This view has repeatedly been entrenched and distributed by media coverage and commentaries through the years. Instead the first twenty year of the Internet was acceptably secure, due to the limited abilities of the attackers, compared to the threat generated from a militarized Internet with state actors conducting cyber operations. In reality, the Internet have a reversed trajectory for its security where it has become more unsafe over time and moved from a threat to the individual to a …


Nuclear Deterrence In A Second Obama Term, Adam Lowther, Jan Kallberg Mar 2013

Nuclear Deterrence In A Second Obama Term, Adam Lowther, Jan Kallberg

Jan Kallberg

In the months prior to the 2012 presidential election in the United States, members of the Obama administration and sympathetic organizations inside the Beltway began floating the idea that the administration would pursue – after an Obama victory – further reductions in the US nuclear arsenal. With the ink still wet on the New ST ART Treaty, efforts to reduce the American arsenal to 1000 operationally deployed strategic nuclear weapons or, as some suggest, 500, is certainly premature. These efforts illustrate a poor understanding of nuclear deterrence theory and practice and the ramifications of a United States that lacks a …


Conditional Random Fields: An Introduction, Hanna M. Wallach Feb 2013

Conditional Random Fields: An Introduction, Hanna M. Wallach

Hanna M. Wallach

No abstract provided.


Offensive Cyber: Superiority Or Stuck In Legal Hurdles?, Jan Kallberg Feb 2013

Offensive Cyber: Superiority Or Stuck In Legal Hurdles?, Jan Kallberg

Jan Kallberg

In recent years, offensive cyber operations have attracted significant interest from the non-Defense Department academic legal community, prompting numerous articles seeking to create a legal theory for cyber conflicts. Naturally, cyber operations should be used in an ethical way, but the hurdles generated by the legal community are staggering. At a time when the United States has already lost an estimated $4 trillion in intellectual property as a result of foreign cyber espionage, not to mention the loss of military advantage, focusing on what the United States cannot do in cyberspace only hinders efforts to defend the country from future …


Human Resource Information Systems: Information Security Concerns For Organizations, Humayun Zafar Jan 2013

Human Resource Information Systems: Information Security Concerns For Organizations, Humayun Zafar

Humayun Zafar

We explore HRIS and e-HR security by presenting information security fundamentals and how they pertain to organizations. With increasing use of enterprise systems such as HRIS and e-HR, security of such systems is an area that is worthy of further exploration. Even then, there is surprisingly little research in this area, albeit that extensive work is present in regard to HRIS privacy. While focusing on HRIS and e-HR security, we introduce aspects of HRIS and e-HR security and how it can be enhanced in organizations. A research model is also presented along with propositions that can guide future research.


A Qualitative Review Of Differential Diagnosis Generators, William Bond Md, Ms, Linda M. Schwartz Mde, Ahip, Cm, Kevin R. Weaver Do, Donald Levick Md, Mba, Michael Guliano Md, Med, Mhpe, Mark L. Graber Md Jan 2013

A Qualitative Review Of Differential Diagnosis Generators, William Bond Md, Ms, Linda M. Schwartz Mde, Ahip, Cm, Kevin R. Weaver Do, Donald Levick Md, Mba, Michael Guliano Md, Med, Mhpe, Mark L. Graber Md

Linda Matula Schwartz MDE, AHIP, CM

No abstract provided.


Europe In A ‘Nato Light’ World - Building Affordable And Credible Defense For The Eu, Jan Kallberg, Adam Lowther Jan 2013

Europe In A ‘Nato Light’ World - Building Affordable And Credible Defense For The Eu, Jan Kallberg, Adam Lowther

Jan Kallberg

From an outsider’s perspective, the Common Security and Defense Policy and the efforts of the European Defense Agency are insufficient to provide Europe with the defense it will require in coming decades. While the European Union—particularly the members of the European Monetary Union—struggle to solve prolonged fiscal challenges, viable European security alternatives to an American-dominated security architecture are conspicuously absent from the documents and discussions that are coming from the European Council and at a time when the United States is engaged in an Asia-Pacific pivot. This is not to say that no thought has been given to defense issues. …


Cyber Operations Bridging From Concept To Cyber Superiority, Jan Kallberg, Bhavani Thuraisingham Jan 2013

Cyber Operations Bridging From Concept To Cyber Superiority, Jan Kallberg, Bhavani Thuraisingham

Jan Kallberg

The United States is preparing for cyber conflicts and ushering in a new era for national security. The concept of cyber operations is rapidly developing, and the time has come to transpose the conceptual heights to a broad ability to fight a strategic cyber conflict and defend the Nation in a cohesive way. Richard M. George, a former National Security Agency official, commented on recent developments: “Other countries are preparing for a cyberwar. If we’re not pushing the envelope in cyber, somebody else will.”1 Therefore, increased budgets are allocated to cyber operations research and education. The Defense Advanced Research Projects …