Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Sciences (332)
- Databases and Information Systems (106)
- Mathematics (80)
- Chemistry (71)
- Physics (62)
-
- Life Sciences (23)
- Social and Behavioral Sciences (22)
- Earth Sciences (19)
- Geology (18)
- Bioinformatics (15)
- Business (14)
- Medicine and Health Sciences (12)
- Numerical Analysis and Scientific Computing (12)
- Education (9)
- Technology and Innovation (8)
- Communication (7)
- Information Security (7)
- Arts and Humanities (6)
- Communication Technology and New Media (6)
- Genetics and Genomics (6)
- Health Information Technology (6)
- Public Affairs, Public Policy and Public Administration (5)
- Artificial Intelligence and Robotics (4)
- Environmental Sciences (4)
- Geography (4)
- Higher Education (4)
- Statistics and Probability (4)
- Biology (3)
- Educational Administration and Supervision (3)
- Keyword
-
- Answer set programming (27)
- Knowledge representation (14)
- Satisfiability (11)
- Workshop (11)
- Security (9)
-
- Logic programming (8)
- Virtual teams (8)
- Collaboration (7)
- Information technology (7)
- Privacy (7)
- Propositional satisfiability (7)
- Virtual worlds (7)
- ASP (6)
- Answer set solver (6)
- Internet of things (6)
- SAT (6)
- Superconvergence (6)
- Bioinformatics (5)
- Boolean networks (5)
- Chordal graphs (5)
- Composition operator (5)
- Correlation networks (5)
- Development (5)
- Energy Awareness (5)
- IT for Development (5)
- Parallel Processing (5)
- Patterns (5)
- Scheduling (5)
- Stars: chemically peculiar (5)
- Syntax (5)
- Publication Year
- Publication
-
- Information Systems and Quantitative Analysis Faculty Publications (81)
- Computer Science Faculty Publications (77)
- Mathematics Faculty Publications (76)
- Information Systems and Quantitative Analysis Faculty Proceedings & Presentations (64)
- Computer Science Faculty Proceedings & Presentations (63)
-
- Chemistry Faculty Publications (59)
- Physics Faculty Publications (58)
- Interdisciplinary Informatics Faculty Publications (24)
- Interdisciplinary Informatics Faculty Proceedings & Presentations (20)
- Geography and Geology Faculty Publications (16)
- Biology Faculty Publications (3)
- Mathematics Faculty Proceedings & Presentations (3)
- Bibliographies (1)
- Chemistry Faculty Proceedings & Presentations (1)
- Communication Faculty Publications (1)
- Criss Library Faculty Proceedings & Presentations (1)
- Graduate Catalogs (1)
- Physics Faculty Proceedings & Presentations (1)
- Psychology Faculty Publications (1)
- Publications (1)
- Service Learning, General (1)
- Student Support (1)
- Undergraduate Catalogs (1)
- White Papers (1)
Articles 1 - 30 of 556
Full-Text Articles in Physical Sciences and Mathematics
Locally Tight Programs, Jorge Fandinno, Vladimir Lifschitz, Nathan Temple
Locally Tight Programs, Jorge Fandinno, Vladimir Lifschitz, Nathan Temple
Computer Science Faculty Publications
Program completion is a translation from the language of logic programs into the language of first-order theories. Its original definition has been extended to programs that include integer arithmetic, accept input, and distinguish between output predicates and auxiliary predicates. For tight programs, that generalization of completion is known to match the stable model semantics, which is the basis of answer set programming. We show that the tightness condition in this theorem can be replaced by a less restrictive “local tightness” requirement. From this fact we conclude that the proof assistant ANTHEM-P2P can be used to verify equivalence between locally tight …
Locally Tight Programs, Jorge Fandinno, Vladimir Lifschitz, Nathan Temple
Locally Tight Programs, Jorge Fandinno, Vladimir Lifschitz, Nathan Temple
Computer Science Faculty Publications
Program completion is a translation from the language of logic programs into the language of first-order theories. Its original definition has been extended to programs that include integer arithmetic, accept input, and distinguish between output predicates and auxiliary predicates. For tight programs, that generalization of completion is known to match the stable model semantics, which is the basis of answer set programming. We show that the tightness condition in this theorem can be replaced by a less restrictive “local tightness” requirement. From this fact we conclude that the proof assistant ANTHEM-P2P can be used to verify equivalence between locally tight …
External Behavior Of A Logic Program And Verification Of Refactoring, Jorge Fandinno, Zachary Hansen, Yuliya Lierler, Vladimir Lifschitz, Nathan Temple
External Behavior Of A Logic Program And Verification Of Refactoring, Jorge Fandinno, Zachary Hansen, Yuliya Lierler, Vladimir Lifschitz, Nathan Temple
Computer Science Faculty Publications
Refactoring is modifying a program without changing its external behavior. In this paper, we make the concept of external behavior precise for a simple answer set programming language. Then we describe a proof assistant for the task of verifying that refactoring a program in that language is performed correctly.
System Predictor: Grounding Size Estimator For Logic Programs Under Answer Set Semantics, Daniel Bresnahan, Nicholas Hippen, Yuliya Lierler
System Predictor: Grounding Size Estimator For Logic Programs Under Answer Set Semantics, Daniel Bresnahan, Nicholas Hippen, Yuliya Lierler
Computer Science Faculty Publications
Answer set programming is a declarative logic programming paradigm geared towards solving difficult combinatorial search problems. While different logic programs can encode the same problem, their performance may vary significantly. It is not always easy to identify which version of the program performs the best. We present the system PREDICTOR (and its algorithmic backend) for estimating the grounding size of programs, a metric that can influence a performance of a system processing a program. We evaluate the impact of PREDICTOR when used as a guide for rewritings produced by the answer set programming rewriting tools PROJECTOR and LPOPT. The results …
Efficient Convoy Routing And Bridge Load Optimization User Interface, Brandon Lacy, Will Heller, Yonas Kassa, Brian Ricks, Robin Gandhi
Efficient Convoy Routing And Bridge Load Optimization User Interface, Brandon Lacy, Will Heller, Yonas Kassa, Brian Ricks, Robin Gandhi
Information Systems and Quantitative Analysis Faculty Proceedings & Presentations
No abstract provided.
Building Explainable Machine Learning Lifecycle: Model Training, Selection, And Deployment With Explainability, Vidit Singh, Yonas Kassa, Brian Ricks, Robin Gandhi
Building Explainable Machine Learning Lifecycle: Model Training, Selection, And Deployment With Explainability, Vidit Singh, Yonas Kassa, Brian Ricks, Robin Gandhi
Information Systems and Quantitative Analysis Faculty Proceedings & Presentations
No abstract provided.
Developing Architecture For A Routing System Using Bridge Data And Adversary Avoidance, Will Heller, Brian Ricks, Yonas Kassa, Brandon Lacy, Rahul Kamar Nethakani
Developing Architecture For A Routing System Using Bridge Data And Adversary Avoidance, Will Heller, Brian Ricks, Yonas Kassa, Brandon Lacy, Rahul Kamar Nethakani
Information Systems and Quantitative Analysis Faculty Proceedings & Presentations
No abstract provided.
Progress In A New Visualization Strategy For Ml Models, Alex Wissing, Brian Ricks, Robin Gandhi, Yonas Kassa, Akshay Kale
Progress In A New Visualization Strategy For Ml Models, Alex Wissing, Brian Ricks, Robin Gandhi, Yonas Kassa, Akshay Kale
Information Systems and Quantitative Analysis Faculty Proceedings & Presentations
No abstract provided.
How To Select Simple-Yet-Accurate Model Of Bridge Maintenance?, Akshay Kale, Yonas Kassa, Brian Ricks, Robin Gandhi
How To Select Simple-Yet-Accurate Model Of Bridge Maintenance?, Akshay Kale, Yonas Kassa, Brian Ricks, Robin Gandhi
Information Systems and Quantitative Analysis Faculty Proceedings & Presentations
No abstract provided.
Positive Dependency Graphs Revisited, Jorge Fandinno, Vladimir Lifschitz
Positive Dependency Graphs Revisited, Jorge Fandinno, Vladimir Lifschitz
Computer Science Faculty Publications
Theory of stable models is the mathematical basis of answer set programming. Several results in that theory refer to the concept of the positive dependency graph of a logic program. We describe a modification of that concept and show that the new understanding of positive dependency makes it possible to strengthen some of these results.
Abstract Argumentation And Answer Set Programming: Two Faces Of Nelson’S Logic, Jorge Fandinno, Luis Fariñas Del Cerro
Abstract Argumentation And Answer Set Programming: Two Faces Of Nelson’S Logic, Jorge Fandinno, Luis Fariñas Del Cerro
Computer Science Faculty Publications
In this work, we show that both logic programming and abstract argumentation frameworks can be interpreted in terms of Nelson’s constructive logic N4. We do so by formalising, in this logic, two principles that we call noncontradictory inference and strengthened closed world assumption: the first states that no belief can be held based on contradictory evidence while the latter forces both unknown and contradictory evidence to be regarded as false. Using these principles, both logic programming and abstract argumentation frameworks are translated into constructive logic in a modular way and using the object language. Logic programming implication and abstract argumentation …
The 10th Annual Computer Science Workshop, Submissions, Abstract Template, Computer Science Department
The 10th Annual Computer Science Workshop, Submissions, Abstract Template, Computer Science Department
Computer Science Faculty Proceedings & Presentations
This is the abstract template for the 10th Annual Computer Science Graduate Research Workshop (2022). To learn more about this workshop, please visit: https://digitalcommons.unomaha.edu/csworkshop/2022/.
On The Security Of Bluetooth Low Energy In Two Consumer Wearable Heart Rate Monitors/Sensing Devices, Yesem Kurt Peker, Gabriel Bello, Alfredo J. Perez
On The Security Of Bluetooth Low Energy In Two Consumer Wearable Heart Rate Monitors/Sensing Devices, Yesem Kurt Peker, Gabriel Bello, Alfredo J. Perez
Computer Science Faculty Publications
Since its inception in 2013, Bluetooth Low Energy (BLE) has become the standard for short-distance wireless communication in many consumer devices, as well as special-purpose devices. In this study, we analyze the security features available in Bluetooth LE standards and evaluate the features implemented in two BLE wearable devices (a Fitbit heart rate wristband and a Polar heart rate chest wearable) and a BLE keyboard to explore which security features in the BLE standards are implemented in the devices. In this study, we used the ComProbe Bluetooth Protocol Analyzer, along with the ComProbe software to capture the BLE traffic of …
Factors Affecting Student Educational Choices Regarding Oer Material In Computer Science, Anastasia Angelopoulou, Rania Hodhod, Alfredo J. Perez
Factors Affecting Student Educational Choices Regarding Oer Material In Computer Science, Anastasia Angelopoulou, Rania Hodhod, Alfredo J. Perez
Computer Science Faculty Publications
The use of Open Educational Resources (OER) in course settings provides a solution to reduce the textbook barrier. Several published studies have concluded that high textbook costs may influence students' educational choices. However, there are other student characteristics that may be relevant to OER. In this work, we study various factors that may influence students' educational choices regarding OER and their impact on a student’s perspectives on OER use and quality. More specifically, we investigate whether there are significant differences in the frequency of use and perceived quality of the OER textbook based on gender, prior academic achievements, income, seniority, …
Secure And Privacy-Preserving Crowdsensing Using Smart Contracts: Issues And Solutions, Alfredo J. Perez, Sherali Zeadally
Secure And Privacy-Preserving Crowdsensing Using Smart Contracts: Issues And Solutions, Alfredo J. Perez, Sherali Zeadally
Computer Science Faculty Publications
The advent of Blockchain and smart contracts is empowering many technologies and systems to automate commerce and facilitate the exchange, tracking and the provision of goods, data and services in a reliable and auditable way. Crowdsensing systems is one type of systems that have been receiving a lot of attention in the past few years. In crowdsensing systems consumer devices such as mobile phones and Internet of Things devices are used to deploy wide-scale sensor networks. We identify some of the major security and privacy issues associated with the development of crowdsensing systems based on smart contracts and Blockchain. We …
Entropy Analysis Of Boolean Network Reduction According To The Determinative Power Of Nodes, Matthew J. Pelz, Mihaela T. Velcsov
Entropy Analysis Of Boolean Network Reduction According To The Determinative Power Of Nodes, Matthew J. Pelz, Mihaela T. Velcsov
Mathematics Faculty Publications
Boolean networks are utilized to model systems in a variety of disciplines. The complexity of the systems under exploration often necessitates the construction of model networks with large numbers of nodes and unwieldy state spaces. A recently developed, entropy-based method for measuring the determinative power of each node offers a new method for identifying the most relevant nodes to include in subnetworks that may facilitate analysis of the parent network. We develop a determinative-power-based reduction algorithm and deploy it on 36 network types constructed through various combinations of settings with regards to the connectivity, topology, and functionality of networks. We …
Recent Advances In Wearable Sensing Technologies, Alfredo J. Perez, Sherali Zeadally
Recent Advances In Wearable Sensing Technologies, Alfredo J. Perez, Sherali Zeadally
Computer Science Faculty Publications
Wearable sensing technologies are having a worldwide impact on the creation of novel business opportunities and application services that are benefiting the common citizen. By using these technologies, people have transformed the way they live, interact with each other and their surroundings, their daily routines, and how they monitor their health conditions. We review recent advances in the area of wearable sensing technologies, focusing on aspects such as sensor technologies, communication infrastructures, service infrastructures, security, and privacy. We also review the use of consumer wearables during the coronavirus disease 19 (COVID-19) pandemic caused by the severe acute respiratory syndrome coronavirus …
Swift Trust And Sensemaking In Fast Response Virtual Teams, Xiaodan Yu, Yuanyanhang Shen, Deepak Khazanchi
Swift Trust And Sensemaking In Fast Response Virtual Teams, Xiaodan Yu, Yuanyanhang Shen, Deepak Khazanchi
Information Systems and Quantitative Analysis Faculty Publications
Fast-response virtual teams (FRVTs) have been developed as a response to emergent challenges faced by organizations that need to be addressed urgently. Even though FRVTs offer enormous potential in terms of their benefits, their success is not guaranteed. When used, the need for high performing FRVTs has become critical for organizational success. However, there is a lack of detailed understanding of how sensemaking can potentially influence FRVT performance. Drawing on social exchange theory, we identify swift trust as a potential antecedent of sensemaking. In this paper, we report the results of a study that examined the effects of swift trust …
A Single-Scale Fractal Feature For Classification Of Color Images: A Virus Case Study, Walker Arce, James E. Pierce, Mihaela T. Velcsov
A Single-Scale Fractal Feature For Classification Of Color Images: A Virus Case Study, Walker Arce, James E. Pierce, Mihaela T. Velcsov
Mathematics Faculty Publications
Current methods of fractal analysis rely on capturing approximations of an images’ fractal dimension by distributing iteratively smaller boxes over the image, counting the set of box and fractal, and using linear regression estimators to estimate the slope of the set count line. To minimize the estimation error in those methods, our aim in this study was to derive a generalized fractal feature that operates without iterative box sizes or any linear regression estimators. To do this, we adapted the Minkowski-Bouligand box counting dimension to a generalized form by fixing the box size to the smallest fundamental unit (the individual …
Analytical And Numerical Convexity Results For Discrete Fractional Sequential Differences With Negative Lower Bound, Christopher S. Goodrich, Benjamin Lyons, Andrea Scapellato, Mihaela T. Velcsov
Analytical And Numerical Convexity Results For Discrete Fractional Sequential Differences With Negative Lower Bound, Christopher S. Goodrich, Benjamin Lyons, Andrea Scapellato, Mihaela T. Velcsov
Mathematics Faculty Publications
We investigate relationships between the sign of the discrete fractional sequential difference (Δv 1+a-μ Δμaf)(t) and the convexity of the function t→f(t). In particular, we consider the case in which the bound (Δv 1+a-μ Δμaf)(t) ≥εf(a), for some ε > 0 and where f(a) < 0 is satisfied. Thus, we allow for the case in which the sequential difference may be negative, and we show that even though the fractional difference can be negative, the convexity of the function f can be implied by the above inequality nonetheless. This demonstrates a significant dissimilarity between the fractional and non-fractional cases. We use a combination of both hard analysis and numerical simulation.
Analytical And Numerical Monotonicity Results For Discrete Fractional Sequential Differences With Negative Lower Bound, Christopher S. Goodrich, Benjamin Lyons, Mihaela T. Velcsov
Analytical And Numerical Monotonicity Results For Discrete Fractional Sequential Differences With Negative Lower Bound, Christopher S. Goodrich, Benjamin Lyons, Mihaela T. Velcsov
Mathematics Faculty Publications
We investigate the relationship between the sign of the discrete fractional sequential difference(Δv1+a-μ Δaμf)(t) and the monotonicity of the function t→f(t). More precisely, we consider the special case in which this fractional difference can be negative and satisfies the lower bound (Δv1+a-μ Δaμf)(t) ≥ -εf(a), for some ε >0. We prove that even though the fractional difference can be negative, the monotonicity of the function f, nonetheless, is still implied by the above inequality. This demonstrates a significant dissimilarity between the fractional and non-fractional cases. Because of the challenges …
Politeness In Security Directives: Insights In Browser Compliance For The Human Element, Deanna House, Gabe Giordano
Politeness In Security Directives: Insights In Browser Compliance For The Human Element, Deanna House, Gabe Giordano
Information Systems and Quantitative Analysis Faculty Publications
The technical protection provided by information security technology is necessary as a frontline defense against threats. However, the human element adds great risk to systems and cannot be ignored. This research explores the human elements related to security communications and intention to comply with security directives. Security communications are more-commonly being sent using richer computer-based channels. While the goal of security communications is the gain compliance, there is still much to learn related to what influences a user to comply. This research explores the effects that (im)politeness has on intention to comply with security directives. The research utilized an experiment …
A User Study Of A Wearable System To Enhance Bystanders’ Facial Privacy, Alfredo J. Perez, Sherali Zeadally, Scott Griffith, Luis Y. Matos Garcia, Jason A. Mouloud
A User Study Of A Wearable System To Enhance Bystanders’ Facial Privacy, Alfredo J. Perez, Sherali Zeadally, Scott Griffith, Luis Y. Matos Garcia, Jason A. Mouloud
Computer Science Faculty Publications
The privacy of users and information are becoming increasingly important with the growth and pervasive use of mobile devices such as wearables, mobile phones, drones, and Internet of Things (IoT) devices. Today many of these mobile devices are equipped with cameras which enable users to take pictures and record videos anytime they need to do so. In many such cases, bystanders’ privacy is not a concern, and as a result, audio and video of bystanders are often captured without their consent. We present results from a user study in which 21 participants were asked to use a wearable system called …
Cyber Supply Chain Risk Management: Toward An Understanding Of The Antecedents To Demand For Assurance, Clark Hampton, Steve G. Sutton, Vicky Arnold, Deepak Khazanchi
Cyber Supply Chain Risk Management: Toward An Understanding Of The Antecedents To Demand For Assurance, Clark Hampton, Steve G. Sutton, Vicky Arnold, Deepak Khazanchi
Information Systems and Quantitative Analysis Faculty Publications
Recognizing the need for effective cyber risk management processes across the supply chain, the AICPA issued a new SOC in March 2020 for assuring cyber supply chain risk management (C-SCRM) processes. This study examines supply chain relationship factors and cyber risk issues to better understand the demand for C-SCRM assurance. Resource-Advantage Theory of Competition provides the conceptual foundation for assessing the dual drivers of relationship building and cyber risk management on demand for assurance. We use a field survey to collect data from 205 professionals enabling evaluation of the complex relationships in the theoretical model. Results support all hypotheses, provide …
Effect Of Implementing Subgoals In Code.Org's Intro To Programming Unit In Computer Science Principles, Lauren E. Margulieux, Briana Baker Morrison, Baker Franke, Hari Ramilison
Effect Of Implementing Subgoals In Code.Org's Intro To Programming Unit In Computer Science Principles, Lauren E. Margulieux, Briana Baker Morrison, Baker Franke, Hari Ramilison
Computer Science Faculty Publications
The subgoal learning framework has improved performance for novice programmers in higher education, but it has only started to be applied and studied in K-12 (primary/secondary). Programming education in K-12 is growing, and many international initiatives are attempting to increase participation, including curricular initiatives like Computer Science Principles and non-profit organizations like Code.org. Given that subgoal learning is designed to help students with no prior knowledge, we designed and implemented subgoals in the introduction to programming unit in Code.org's Computer Science Principles course. The redesigned unit includes subgoal-oriented instruction and subgoal-themed pre-written comments that students could add to their programming …
Bots And Humans On Social Media, Lale Madahali
Bots And Humans On Social Media, Lale Madahali
Interdisciplinary Informatics Faculty Proceedings & Presentations
Social networks are an important part of today’s life. They are used for entertainment, getting the news, advertisements, and branding for businesses and individuals alike. Research shows that automated accounts, also known as bots, contribute to the content spread on social media allowing the the environment pollution and public opinion manipulation. This research aims at investigating bots’ behavior on Twitter and examine how different and similar they are compared to humans. I will investigate their underlying network, whether it is an information network or social network. In the second step, I attempt to answer whether they follow the structure of …
High-Frequency Data Reveal Differential Dissolved And Suspended Solids Behavior From A Mixed Restored Prairie And Agricultural Catchment, Andrew Miller, Ashlee L. Dere, Tracy Coleman
High-Frequency Data Reveal Differential Dissolved And Suspended Solids Behavior From A Mixed Restored Prairie And Agricultural Catchment, Andrew Miller, Ashlee L. Dere, Tracy Coleman
Chemistry Faculty Publications
Quantifying temporal variability and fluxes within hydrologic catchments is critical to understanding the underlying chemical and physical processes leading to material transport. Measuring variability and fluxes requires sampling at time scales similar to the time scale of process occurrence. This demand has led to the development of automated sampling systems designed to sample at high frequencies, on the order of minutes. While widely deployed in a variety of systems, we installed two high-frequency sampling devices in a single drainage comprised of restored prairie and agricultural land uses in temperate Eastern Nebraska. The sampling systems determined flow rate, conductivity, and turbidity …
Prototypical Career Paths In Urban, Suburban, And Rural Locations In The United States, Tenace Kwaku Setor, Damien Joseph
Prototypical Career Paths In Urban, Suburban, And Rural Locations In The United States, Tenace Kwaku Setor, Damien Joseph
Information Systems and Quantitative Analysis Faculty Publications
Career paths are formed over time from interactions between individuals, organizations, and labor markets within and across geographic locations. What are the prototypical career paths thus formed? Who are the likely incumbents of these career paths? What are the consequences of pursuing these career paths? This study combines micro-level perspectives on personal agency and macro-level institutional factors to explain how careers unfold over time and space. The juxtaposition of micro- and macro-level factors contributes to career research and practice, which have traditionally examined careers as movements across organizations and occupations over time, but almost exclusively within specific geographic locations. We …
When Agile Means Staying: A Moderated Mediated Model, Tenace Kwaku Setor
When Agile Means Staying: A Moderated Mediated Model, Tenace Kwaku Setor
Information Systems and Quantitative Analysis Faculty Publications
The design of software development methods focuses on improving task processes, including accommodating changing user requirements and accelerating product delivery. However, there is limited research on how the use of different software development methods impacts IT professionals’ perceptions of organizational mobility. Drawing on concepts from the agile development literature and job characteristics theory, we formulate a moderated mediation model explicating the mechanism and the condition under which agile development use exerts an influence on IT professionals’ intention to stay with their current employer. Specifically, we examine job satisfaction as mediating the effect of using agile development on the intention to …
Reducing Withdrawal And Failure Rates In Introductory Programming With Subgoal Labeled Worked Examples, Lauren E. Margulieux, Briana B. Morrison, Adrienne Decker
Reducing Withdrawal And Failure Rates In Introductory Programming With Subgoal Labeled Worked Examples, Lauren E. Margulieux, Briana B. Morrison, Adrienne Decker
Computer Science Faculty Publications
Background
Programming a computer is an increasingly valuable skill, but dropout and failure rates in introductory programming courses are regularly as high as 50%. Like many fields, programming requires students to learn complex problem-solving procedures from instructors who tend to have tacit knowledge about low-level procedures that they have automatized. The subgoal learning framework has been used in programming and other fields to breakdown procedural problem solving into smaller pieces that novices can grasp more easily, but it has only been used in short-term interventions. In this study, the subgoal learning framework was implemented throughout a semester-long introductory programming course …